More and more personal information is exchanged on-line using communication protocols. This makes it increasingly important that such protocols satisfy privacy by data minimisation. Formal methods have been used to verify privacy properties of protocols; but so far, mostly in an ad-hoc way. In previous work, we provided general definitions for the fundamental privacy concepts of linkability and detectability. However, this approach is only able to verify privacy properties for given protocol instances. In this work, by generalising the approach, we formally analyse privacy of communication protocols independently from any instance. We implement the model; identify its assumptions by relating it to the instantiated model; and show how to visualise results. To demonstrate our approach, we analyse privacy in Identity Mixer.

Original languageEnglish
Title of host publicationTrust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Proceedings
PublisherSpringer New York
Number of pages16
ISBN (Electronic)978-3-642-38323-6
ISBN (Print)978-3-642-38322-9
Publication statusPublished - 2013
Externally publishedYes
Event7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013 - Malaga, Spain
Duration: 3 Jun 20135 Jun 2013

Publication series

NameIFIP Advances in Information and Communication Technology
ISSN (Print)1868-4238


Conference7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013

ID: 32865291