2018
DOI: 10.1007/978-3-319-98989-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker

Abstract: Abstract. We analyze the FOO electronic voting protocol in the provable security model using the technique of Computationally Complete Symbolic Attacker (CCSA). The protocol uses commitments, blind signatures and anonymous channels to achieve vote privacy. Unlike the Dolev-Yao analyses of the protocol, we assume neither perfect cryptography nor existence of perfectly anonymous channels. Our analysis reveals new attacks on vote privacy, including an attack that arises due to the inadequacy of the blindness prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…We do not know if our problem remains decidable when we include the transitivity axiom. e) Applications: The BC indistinguishability model has been used to analyse RFID protocols [22], a key-wrapping API [23] and an e-voting protocol [24]. Ideally, we would like future case studies to be carried out automatically and machine checked.…”
Section: Introductionmentioning
confidence: 99%
“…We do not know if our problem remains decidable when we include the transitivity axiom. e) Applications: The BC indistinguishability model has been used to analyse RFID protocols [22], a key-wrapping API [23] and an e-voting protocol [24]. Ideally, we would like future case studies to be carried out automatically and machine checked.…”
Section: Introductionmentioning
confidence: 99%
“…Note that some of the results of our contributions appear in the conference paper [BCE18] and in the journal publication [BCEO19].…”
Section: Mechanizing the Proofs Using Coqmentioning
confidence: 96%
“…We reproduce the background of the model from [BCE18]. Computationally, a security property of a protocol ⇧ is formulated as the computational indistinguishability of two protocols ⇧ 1 and ⇧ 2 constructed (depending on the security property) from the original ⇧.…”
Section: Computationally Complete Symbolic Attackermentioning
confidence: 99%
See 2 more Smart Citations