Verifying privacy-type properties of electronic voting protocols

被引:153
作者
Delaune, Stephanie [1 ,2 ,3 ,4 ]
Kremer, Steve [2 ,3 ]
Ryan, Mark [1 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham, W Midlands, England
[2] CNRS ENS Cachan, LSV, 61 Ave President Wilson, F-94233 Cachan, France
[3] INRIA, Futurs Projet SECSI, Cachan, France
[4] INRIA, Cachan, France
基金
英国工程与自然科学研究理事会;
关键词
Voting protocol; applied pi calculus; formal methods; privacy and anonymity properties;
D O I
10.3233/JCS-2009-0340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. We study three privacy-type properties of electronic voting protocols: in increasing order of strength, they are vote-privacy, receiptfreeness and coercion-resistance. We use the applied pi calculus, a formalism well adapted to modelling such protocols, which has the advantages of being based on well-understood concepts. The privacy-type properties are expressed using observational equivalence and we show in accordance with intuition that coercion-resistance implies receipt-freeness, which implies vote-privacy. We illustrate our definitions on three electronic voting protocols from the literature. Ideally, these three properties should hold even if the election officials are corrupt. However, protocols that were designed to satisfy receipt-freeness or coercion-resistance may not do so in the presence of corrupt officials. Our model and definitions allow us to specify and easily change which authorities are supposed to be trustworthy.
引用
收藏
页码:435 / 487
页数:53
相关论文
共 46 条
  • [1] A calculus for cryptographic protocols: The spi calculus
    Abadi, M
    Gordon, AD
    [J]. INFORMATION AND COMPUTATION, 1999, 148 (01) : 1 - 70
  • [2] Mobile values, new names, and secure communication
    Abadi, M
    Fournet, C
    [J]. ACM SIGPLAN NOTICES, 2001, 36 (03) : 104 - 115
  • [3] Just fast keying in the Pi calculus
    Abadi, Martin
    Blanchet, Bruno
    Fournet, Cedric
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [4] Automated verification of remote electronic voting protocols in the applied pi-calculus
    Backes, Michael
    Hritcu, Catalin
    Maffei, Matteo
    [J]. CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 195 - 209
  • [5] Baskar A., 2007, TARK 2007, P62, DOI [10.1145/1324249.1324261, DOI 10.1145/1324249.1324261]
  • [6] Baudet Mathieu, 2005, P 12 ACM C COMP COMM, P16
  • [7] Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
  • [8] Benaloh J., 1987, THESIS
  • [9] An efficient cryptographic protocol verifier based on prolog rules
    Blanchet, B
    [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 82 - 96
  • [10] Automated verification of selected equivalences for security protocols
    Blanchet, Bruno
    Abadi, Martin
    Fournet, Cedric
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51