FOO e-Voting Protocol: Inductive Analysis of the Eligibility Property

被引:0
|
作者
Miramirkhani, N. S.
Jalili, R.
Yarmohamadi, M.
机构
来源
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC) | 2012年
关键词
component; formalization; e-voting; Inductive Method; theorem proving; eligibility; KERBEROS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are two main approaches in verifying security protocols: model checking and theorem proving. Inductive Method is one of the notable works based on pure theorem proving. Although there is no automatic tool to implement this method, it has been successful in analyzing many classic to real world protocols such as SET under an unlimited number of agents interleaving an infinite number of sessions. E-voting protocols are one of the challenging protocols that use different advanced security primitives and should guarantee various complicated security goals. Using the great potential of the Inductive Method in formalizing new concepts, we found the opportunity of analyzing these protocols by this method. We first extend the method to support two common security primitives ( blind signature and bit commitment) used in some e-voting protocols such as FOO'92. Then we show that our extension is compatible with already defined elements of the Inductive Method and it also meets the desired requirements and behaviors. Using our formalizations, we model the e-voting protocol FOO'92. Moreover we specify the eligibility goal and prove by inductive analyses that the protocol guarantees this goal.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 50 条
  • [1] A Formal Analysis of the Norwegian E-voting Protocol
    Cortier, Veronique
    Wiedling, Cyrille
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 109 - 128
  • [2] Prototype Implementation of DynaVote e-Voting Protocol
    Cetinkaya, Orhan
    Koc, Mehmet Levent
    9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 200 - +
  • [3] An Improved Dynavote E-Voting Protocol Implementation
    AbdulRahim, Abdulwasiu Kailani
    Folorunso, Olusegun
    Sharma, Sushil K.
    INTERNATIONAL JOURNAL OF E-ADOPTION, 2011, 3 (03) : 44 - 61
  • [4] The security analysis of e-voting in Japan
    Hisamitsu, Hiroki
    Takeda, Keiji
    E-VOTING AND IDENTITY, 2007, 4896 : 99 - 110
  • [5] Electronic Voting (E-Voting) in Indonesia: Reflection On E-Voting Practices in Some Countries
    Fanida, Eva Hany
    Manda, Darman
    Mandagi, Marthinus
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES (ICSS 2018), 2018, 226 : 150 - 155
  • [6] E-Voting Systems
    Kuesters, Ralf
    SOFTWARE SYSTEMS SAFETY, 2014, 36 : 135 - 164
  • [7] E-voting cards based on SARG04 protocol
    Sobota, Marcin
    PROCEEDINGS OF THE 11TH SCIENTIFIC CONFERENCE INTERNET IN THE INFORMATION SOCIETY 2016, 2016, : 351 - 356
  • [8] E-Voting on the Blockchain
    Curran, Kevin
    JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2018, 1 (02)
  • [9] Security in e-voting
    Kuesters, Ralf
    Truderung, Tomasz
    IT-INFORMATION TECHNOLOGY, 2014, 56 (06): : 300 - 306
  • [10] Enhanced E-Voting Protocol Based on Public Key Cryptography
    Almimi, Hani M.
    Shahin, Samar A.
    Daoud, Mohammad Sh
    Al Fayoumi, Mustafa
    Ghadi, Yazeed
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 218 - 221