Design and Formal Analysis of Electronic Voting Protocol using AVISPA

被引:0
|
作者
Oo, Htet Ne [1 ]
Aung, Aye Moe [1 ]
机构
[1] Univ Technol Yatanarpon Cyber City, Fac Informat & Commun Technol, Pyin Oo Lwin, Myanmar
来源
2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT) | 2017年
关键词
Analysis; AVISPA; Electronic voting; Eligibility; Fairness; Receipt-freness; Verifiability;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
There are many important security properties that electronic voting protocols and systems need to satisfy. They are eligibility, fairness, security, verifiability, coercion resistance and receipt-freeness. Presently, most electronic voting systems fulfill only some of the required properties. Among these properties, receipt-freeness and verifiability properties contradict each other. So, this paper aims to describe a voting protocol that satisfies both properties simultaneously without effecting security. And an electronic voting system is implemented and formally analyzed by using AVISPA tool.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] A Distributed Self-Tallying Electronic Voting System Using the Smart Contract
    Yao, Jingyu
    Yang, Bo
    Wang, Tao
    Zhang, Wenzheng
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (04) : 1063 - 1076
  • [42] Formalization and analysis of Borda protocol using pi calculus
    Kurhade, Bhakti S.
    Kshirsagar, Manali
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [43] Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space
    Wang, Hong
    Ma, Jianping
    Chen, Bo
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 469 - +
  • [44] TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules
    Fink, Russell A.
    Sherman, Alan T.
    Carback, Richard
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) : 628 - 637
  • [45] A Systematic Literature Review of Current Trends in Electronic Voting System Protection Using Modern Cryptography
    Aidynov, Tolegen
    Goranin, Nikolaj
    Satybaldina, Dina
    Nurusheva, Assel
    APPLIED SCIENCES-BASEL, 2024, 14 (07):
  • [46] Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing
    Yin, Jiaqi
    Zhu, Huibiao
    Fei, Yuan
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) : 2258 - 2271
  • [47] Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing
    Jiaqi Yin
    Huibiao Zhu
    Yuan Fei
    Mobile Networks and Applications, 2021, 26 : 2258 - 2271
  • [48] 1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption
    Her, Yong-Sork
    Imamoto, Kenji
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (1B): : 217 - 226
  • [49] A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting Systems
    Jafar, Uzma
    Ab Aziz, Mohd Juzaiddin
    Shukur, Zarina
    Hussain, Hafiz Adnan
    SENSORS, 2022, 22 (19)
  • [50] Secure electronic voting machine using multi-modal biometric authentication system, data encryption, and firewall
    Bhatti J.
    Chachra S.
    Walia A.
    Vishal A.
    International Journal of Performability Engineering, 2019, 15 (10): : 2570 - 2577