Automated verification of remote electronic voting protocols in the applied pi-calculus

被引:63
作者
Backes, Michael [1 ]
Hritcu, Catalin [1 ]
Maffei, Matteo [1 ]
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
来源
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CSF.2008.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part definitions that address several this paper, we provide novel de important security properties. In particular, we propose a new,formalization of coercion-resistance in terms of observational equivalence. In contrast to previous definitions in the symbolic model, our definition of coercion-resistance is suitable for automation and captures simulation and forced-abstention attacks. Additionally, we express inalterability, eligibility and non-reusability as a correspondence property on traces. In the second part, we use ProVerif to illustrate the feasibility of our technique by providing the first automated security proof of the coercion-resistant protocol proposed by Juels, Catalano, and Jakobsson.
引用
收藏
页码:195 / 209
页数:15
相关论文
共 31 条
  • [1] Secrecy by typing in security protocols
    Abadi, M
    [J]. JOURNAL OF THE ACM, 1999, 46 (05) : 749 - 786
  • [2] ABADI M, 2007, J LOGIC ALG IN PRESS
  • [3] ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
  • [4] ABADI M, 2001, LECT NOTES COMPUTER, V2030, P25
  • [5] Just fast keying in the Pi calculus
    Abadi, Martin
    Blanchet, Bruno
    Fournet, Cedric
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [6] Acquisti A., 2004, 2004105 CRYPT EPRINT
  • [7] BACKES M, PROVERIF SCRIPTS JUE
  • [8] BACKES M, 2008, IEEE S SEC IN PRESS
  • [9] Backes Michael, 2007, P 20 IEEE S COMP SEC, P355
  • [10] Hack-a-vote: Security issues with electronic voting systems
    Bannet, J
    Price, DW
    Rudys, A
    Singer, J
    Wallach, DS
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (01) : 32 - 37