2009
DOI: 10.3233/jcs-2009-0340
|View full text |Cite
|
Sign up to set email alerts
|

Verifying privacy-type properties of electronic voting protocols

Abstract: Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. We study three privacy-type properties of electronic voting protocols: in increasing order of strength, they are vote-privacy, receipt-freeness, and coercionresistance.We use the applied pi calculus, a formalism well adapted to mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
364
0
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 232 publications
(374 citation statements)
references
References 43 publications
3
364
0
1
Order By: Relevance
“…Many electronic voting protocols have been proposed in the literature and their formal analysis has received considerable attention [14,4]. One important security goal is privacy of votes-an intruder should not be able to learn (by its interaction with the protocol) how an honest voter Alice voted.…”
Section: Privacy In Electronic Voting Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…Many electronic voting protocols have been proposed in the literature and their formal analysis has received considerable attention [14,4]. One important security goal is privacy of votes-an intruder should not be able to learn (by its interaction with the protocol) how an honest voter Alice voted.…”
Section: Privacy In Electronic Voting Protocolsmentioning
confidence: 99%
“…We then specify privacy in voting protocols, which relies on the epistemic knowledge of the intruder. We show that a definition of vote privacy in terms of process equivalence as defined in [14] implies vote privacy in terms of epistemic logic, as defined in [4]. Then we slightly weaken the equivalence based definition, replacing observational equivalence with trace equivalence.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A typical example is real-or-random secrecy: after interacting with a protocol, an adversary is unable to distinguish the real secret used in the protocol from a random value. Privacy-type properties can also be expressed as such: anonymity may be modeled as the adversary's inability to distinguish two instances of a protocol executed by different agents; vote privacy [DKR09] has been expressed as indistinguishability of the situations where the votes of two agents have been swapped or not; unlinkability [ACRR10] is seen as indistinguishability of two sessions, either both executed by the same agent A, or by two different agents A and B.…”
Section: Introductionmentioning
confidence: 99%