Verifying anonymous credential systems in applied Pi calculus

Xiangxi Li, Yu Zhang, Yuxin Deng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user's identity at the same time. A credential system (a.k.a. pseudonym system) usually consists of multiple interactive procedures between users and organizations, including generating pseudonyms, issuing credentials and verifying credentials, which are required to meet various security properties. We propose a general symbolic model (based on the applied pi calculus) for anonymous credential systems and give formal definitions of a few important security properties, including pseudonym and credential unforgeability, credential safety, pseudonym untraceability. We specialize the general formalization and apply it to the verification of a concrete anonymous credential system proposed by Camenisch and Lysyanskaya. The analysis is done automatically with the tool ProVerif and several security properties have been verified.

Original languageEnglish
Title of host publicationCryptology and Network Security - 8th International Conference, CANS 2009, Proceedings
Pages209-225
Number of pages17
DOIs
StatePublished - 2009
Externally publishedYes
Event8th International Conference on Cryptology and Network Security, CANS 2009 - Kanazawa, Japan
Duration: 12 Dec 200914 Dec 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5888 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Cryptology and Network Security, CANS 2009
Country/TerritoryJapan
CityKanazawa
Period12/12/0914/12/09

Fingerprint

Dive into the research topics of 'Verifying anonymous credential systems in applied Pi calculus'. Together they form a unique fingerprint.

Cite this