2011 Sixth International Conference on Availability, Reliability and Security 2011
DOI: 10.1109/ares.2011.25
|View full text |Cite
|
Sign up to set email alerts
|

Formalization of Receipt-Freeness in the Context of Electronic Voting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Similarly, the symbolic definition of receipt-freeness in [26] also requires the voter to adopt a strategy to fool the adversary. Other definitions in symbolic models aim at characterizing the notion of a receipt [14,33,36] but (as usual in symbolic models) they are much more abstract than standard computational models.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, the symbolic definition of receipt-freeness in [26] also requires the voter to adopt a strategy to fool the adversary. Other definitions in symbolic models aim at characterizing the notion of a receipt [14,33,36] but (as usual in symbolic models) they are much more abstract than standard computational models.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, there does not exist a formal model that satisfies all of the criteria above (Table 1). As mentioned above, the formal model in this paper is based on Grimm, Hupf and Volkamer (2010), Bräunlich and Grimm (2011) and and covers all of the security objectives of Fairness (One Voter, One Vote), Eligibility, Receipt-Freeness, Verifiability and protection against errors by haste. By choosing a stateoriented formalism, the formal model in this paper is suitable for the evaluation and certification of electronic voting products against the CC according to EAL5 or higher.…”
Section: Related Workmentioning
confidence: 99%
“…The formalization in this paper requires some formal basics which are described in this section. This section is mainly a summary of the corresponding parts in Grimm, Hupf, and Volkamer (2010), Bräunlich and Grimm (2011) and .…”
Section: Formal Basicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Verification using process algebras culminated in the successful automatic verification of protocols by Backes, Hriţcu and Maffei [BHM08]. Secondly, there are works formalising privacy in logics, including work by Jonker and De Vink [JdV06] and Bräunlich and Grimm [BG11] in first-order logic, and privacy in epistemic logic by Jonker and Pieters [JP06] and later Baskar, Ramanujam and Suresh [BRS07]. In addition to privacy and verifiability claims, there are a plethora of other security requirements for voting systems.…”
Section: Verifiabilitymentioning
confidence: 99%