More and more personal information is exchanged on-line using communication protocols. This makes it increasingly important that such protocols satisfy privacy by data minimisation. Formal methods have been used to verify privacy properties of protocols; but so far, mostly in an ad-hoc way. In previous work, we provided general definitions for the fundamental privacy concepts of linkability and detectability. However, this approach is only able to verify privacy properties for given protocol instances. In this work, by generalising the approach, we formally analyse privacy of communication protocols independently from any instance. We implement the model; identify its assumptions by relating it to the instantiated model; and show how to visualise results. To demonstrate our approach, we analyse privacy in Identity Mixer.

Original languageEnglish
Title of host publicationTrust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Proceedings
PublisherSpringer New York
Pages1-16
Number of pages16
Volume401
ISBN (Print)9783642383229
StatePublished - 2013
Event7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013 - Malaga, Spain
Duration: 3 Jun 20135 Jun 2013

Publication series

NameIFIP Advances in Information and Communication Technology
Volume401
ISSN (Print)18684238

Conference

Conference7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013
CountrySpain
CityMalaga
Period3/06/135/06/13

ID: 32865291