@inbook{574a80ec45c14acd989fceb0bd49647d,
title = "Compositional analysis of protocol equivalence in the applied pi-calculus using quasi-open bisimilarity",
abstract = "This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the applied -calculus. Furthermore, we show that this equivalence is suited to security and privacy problems expressed as an equivalence problem in the following senses: (1) being a bisimilarity is a safe choice since it does not miss attacks based on rich strategies; (2) being a congruence it enables a compositional approach to proving certain equivalence problems such as unlinkability; and (3) being the coarsest such bisimilarity congruence it can establish proofs of some privacy properties where finer equivalences fail to do so.",
keywords = "compositional analysis, protocol equivalence, quasi-open bisimilarity, security and privacy problems, cryptographic calculi, bisimilarity, security, privacy, compositionality",
author = "Ross Horne and Sjouke Mauw and Semen Yurkov",
note = "{\textcopyright} 2021 The Author(s) Horne, R., Mauw, S., Yurkov, S. (2021). Compositional Analysis of Protocol Equivalence in the Applied -Calculus Using Quasi-open Bisimilarity. In: Cerone, A., {\"O}lveczky, P.C. (eds) Theoretical Aspects of Computing – ICTAC 2021. ICTAC 2021. Lecture Notes in Computer Science(), vol 12819. Springer, Cham. https://doi.org/10.1007/978-3-030-85315-0_14 ; 18th International Colloquium - Theoretical Aspects of Computing – ICTAC 2021, ICTAC 2021 ; Conference date: 08-09-2021 Through 10-09-2021",
year = "2021",
month = aug,
day = "20",
doi = "10.1007/978-3-030-85315-0_14",
language = "English",
isbn = "9783030853143",
volume = "12819",
series = " Lecture Notes in Computer Science - LNCS",
publisher = "Springer",
pages = "235--255",
editor = "Cerone, {Antonio } and {\"O}lveczky, {Peter Csaba }",
booktitle = "Theoretical Aspects of Computing – ICTAC 2021",
}