In our paper, we used the formal security analysis tool ProVerif to provide evidence that our suggested protocol is secure. This page contains the ProVerif model files.

.