The search functionality is under construction.

Author Search Result

[Author] Yoshinobu KAWABE(7hit)

1-7hit
  • An Adversary Model for Simulation-Based Anonymity Proof

    Yoshinobu KAWABE  Hideki SAKURADA  

     
    PAPER

      Vol:
    E91-A No:4
      Page(s):
    1112-1120

    The use of a formal method is a promising approach to developing reliable computer programs. This paper presents a formal method for anonymity, which is an important security property of communication protocols with regard to a user's identity. When verifying the anonymity of security protocols, we need to consider the presence of adversaries. To formalize stronger adversaries, we introduce an adversary model for simulation-based anonymity proof. This paper also demonstrates the formal verification of a communication protocol. We employ Crowds, which is an implementation of an anonymous router, and verify its anonymity. After describing Crowds in a formal specification language, we prove its anonymity with a theorem prover.

  • On Backward-Style Anonymity Verification

    Yoshinobu KAWABE  Ken MANO  Hideki SAKURADA  Yasuyuki TSUKADA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:9
      Page(s):
    2597-2606

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  • FOREWORD Open Access

    Yoshinobu KAWABE  

     
    FOREWORD

      Vol:
    E106-A No:5
      Page(s):
    697-697
  • The Completeness of Order-Sorted Term Rewriting Systems Is Preserved by Currying

    Yoshinobu KAWABE  Naohiro ISHII  

     
    PAPER-Software Theory

      Vol:
    E80-D No:3
      Page(s):
    363-370

    The currying of term rewriting systems (TRSs) is a transformation of TRSs from a functional form to an applicative form. We have already introduced an order-sorted version of currying and proved that the compatibility and confluence of order-sorted TRSs were preserved by currying. In this paper, we focus on a key property of TRSs, completeness. We first show some proofs omitted in Ref. [3]. Then, we prove that the SN (strongly normalizing) property, which corresponds to termination of a program, is preserved by currying. Finally, we prove that the completeness of compatible order-sorted TRSs is preserved by currying.

  • Termination of Order-Sorted Rewriting with Non-minimal Signatures

    Yoshinobu KAWABE  Naohiro ISHII  

     
    PAPER-Software Theory

      Vol:
    E81-D No:8
      Page(s):
    839-845

    In this paper, we extend the Gnaedig's results on termination of order-sorted rewriting. Gnaedig required a condition for order-sorted signatures, called minimality, for the termination proof. We get rid of this restriction by introducing a transformation from a TRS with an arbitrary order-sorted signature to another TRS with a minimal signature, and proving that this transformation preserves termination.

  • Verifying Trace Equivalence of a Shared-Memory-Style Communication System

    Yoshinobu KAWABE  Ken MANO  

     
    PAPER

      Vol:
    E88-A No:4
      Page(s):
    915-922

    This paper describes a formal verification for a shared-memory-style communication system. We first describe two versions (i.e. abstract and concrete) of the communication system based on an I/O-automaton, which is a formal system for distributed algorithms. Then, we prove the concrete version can perform all the external operations of the abstract version. This result, together with a former result, leads to the equivalence of the two versions. The proof is done by Larch theorem prover, and is the ever largest case study using I/O-automata.

  • FOREWORD Open Access

    Yoshinobu KAWABE  

     
    FOREWORD

      Vol:
    E99-D No:6
      Page(s):
    1409-1409