Research Article
[Retracted] A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks
(1) | new VRNT1a: bitstring; new VRNT2a: bitstring; | (2) | new VRNT1b: bitstring; new VRNT2b: | (3) | bitstring; | (4) | ( | (5) | !MS (A, choice[VRNT1a, VRNT1b]) | | (6) | !MS (B, choice[VRNT1b, VRNT1a]) | | (7) | !SN (choice[A, B])) | (8) | -- Observational equivalence | (9)Initial clauses: | (10) | Clause 0: v_31 <> true && attacker2(v_31, true) | (11) | && attacker2(@ mayfail_32, @ mayfail_33) -> | (12) | attacker2(false, @mayfail_33) | (13) | (The attacker applies function &&.) | (14) | Clause 1: v_37 <> true && attacker2(true, v_37) | (15) | && attacker2(@mayfail_36, @mayfail_38) -> | (16) | attacker2(@mayfail_36, false) | (17) | (The attacker applies function &&.) | (18) | RESULT Observational equivalence is true (bad | (19) | not derivable). |
|