Automated verification of remote electronic voting protocols in the applied pi-calculus

被引:64
作者
Backes, Michael [1 ]
Hritcu, Catalin [1 ]
Maffei, Matteo [1 ]
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
来源
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CSF.2008.26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part definitions that address several this paper, we provide novel de important security properties. In particular, we propose a new,formalization of coercion-resistance in terms of observational equivalence. In contrast to previous definitions in the symbolic model, our definition of coercion-resistance is suitable for automation and captures simulation and forced-abstention attacks. Additionally, we express inalterability, eligibility and non-reusability as a correspondence property on traces. In the second part, we use ProVerif to illustrate the feasibility of our technique by providing the first automated security proof of the coercion-resistant protocol proposed by Juels, Catalano, and Jakobsson.
引用
收藏
页码:195 / 209
页数:15
相关论文
共 31 条
[1]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[2]  
ABADI M, 2007, J LOGIC ALG IN PRESS
[3]  
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[4]  
ABADI M, 2001, LECT NOTES COMPUTER, V2030, P25
[5]   Just fast keying in the Pi calculus [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
[6]  
Acquisti A., 2004, 2004105 CRYPT EPRINT
[7]  
BACKES M, PROVERIF SCRIPTS JUE
[8]  
BACKES M, 2008, IEEE S SEC IN PRESS
[9]  
Backes Michael, 2007, P 20 IEEE S COMP SEC, P355
[10]   Hack-a-vote: Security issues with electronic voting systems [J].
Bannet, J ;
Price, DW ;
Rudys, A ;
Singer, J ;
Wallach, DS .
IEEE SECURITY & PRIVACY, 2004, 2 (01) :32-37