@inproceedings{ICTAC21, author = {Horne, Ross and Mauw, Sjouke and Yurkov, Semen}, editor = {Cerone, Antonio and {\"O}lveczky, Peter Csaba}, title = {Compositional Analysis of Protocol Equivalence in the Applied $pi$-Calculus Using Quasi-open Bisimilarity}, booktitle = {Theoretical Aspects of Computing -- ICTAC 2021}, year = {2021}, publisher = {Springer International Publishing}, address = {Cham}, doi = {10.1007/978-3-030-85315-0_14}, pages = {235--255}, abstract = {This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the applied {\$}{\$}{\backslash}pi {\$}{\$}$\pi$-calculus. Furthermore, we show that this equivalence is suited to security and privacy problems expressed as an equivalence problem in the following senses: (1) being a bisimilarity is a safe choice since it does not miss attacks based on rich strategies; (2) being a congruence it enables a compositional approach to proving certain equivalence problems such as unlinkability; and (3) being the coarsest such bisimilarity congruence it can establish proofs of some privacy properties where finer equivalences fail to do so.}, isbn = {978-3-030-85315-0} }