FOO e-Voting Protocol: Inductive Analysis of the Eligibility Property

被引:0
|
作者
Miramirkhani, N. S.
Jalili, R.
Yarmohamadi, M.
机构
来源
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC) | 2012年
关键词
component; formalization; e-voting; Inductive Method; theorem proving; eligibility; KERBEROS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are two main approaches in verifying security protocols: model checking and theorem proving. Inductive Method is one of the notable works based on pure theorem proving. Although there is no automatic tool to implement this method, it has been successful in analyzing many classic to real world protocols such as SET under an unlimited number of agents interleaving an infinite number of sessions. E-voting protocols are one of the challenging protocols that use different advanced security primitives and should guarantee various complicated security goals. Using the great potential of the Inductive Method in formalizing new concepts, we found the opportunity of analyzing these protocols by this method. We first extend the method to support two common security primitives ( blind signature and bit commitment) used in some e-voting protocols such as FOO'92. Then we show that our extension is compatible with already defined elements of the Inductive Method and it also meets the desired requirements and behaviors. Using our formalizations, we model the e-voting protocol FOO'92. Moreover we specify the eligibility goal and prove by inductive analyses that the protocol guarantees this goal.
引用
收藏
页码:128 / 134
页数:7
相关论文
共 50 条
  • [21] Anonymous and formally verified dual signature based online e-voting protocol
    Malik Najmus Saqib
    Junaid Kiani
    Basit Shahzad
    Adeel Anjum
    Saif ur Rehman Malik
    Naveed Ahmad
    Atta ur Rehman Khan
    Cluster Computing, 2019, 22 : 1703 - 1716
  • [22] A COERCION-RESISTANT BLOCKCHAIN-BASED E-VOTING PROTOCOL WITH RECEIPTS
    Spadafora, Chiara
    Longo, Riccardo
    Sala, Massimiliano
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, : 500 - 521
  • [23] Anonymous and formally verified dual signature based online e-voting protocol
    Saqib, Malik Najmus
    Kiani, Junaid
    Shahzad, Basit
    Anjum, Adeel
    Malik, Saif Ur Rehman
    Ahmad, Naveed
    Khan, Atta Ur Rehman
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1703 - 1716
  • [24] Implementation of Simple Verifiability Metric to Measure the Degree of Verifiability of E-Voting Protocol
    Suharsono, Teguh Nurhadi
    Anggraini, Dini
    Kuspriyanto
    Rahardjo, Budi
    Gunawan
    PROCEEDING OF 14TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS, SERVICES, AND APPLICATIONS (TSSA), 2020,
  • [25] Design of a Secured E-voting System
    Hussien, Hanady
    Aboelnaga, Hussien
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [26] MCDM for Candidate Selection in E-Voting
    Alguliyev, Rasim
    Aliguliyev, Ramiz
    Yusifov, Farhad
    INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION IN THE DIGITAL AGE, 2019, 6 (02) : 35 - 48
  • [27] A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA
    Kayode, Akintoye A.
    Araoye, Olalekan
    JURNAL TEKNOLOGI, 2015, 77 (13): : 87 - 91
  • [28] Design and Development of Voting Data Security for Electronic Voting (E-Voting)
    Djanali, Supeno
    Pratomo, Baskoro Adi
    Cipto, Karsono Puguh Nindyo
    Koesriputranto, Astandro
    Studiawan, Hudan
    2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,
  • [29] Examining Students' Satisfaction in Campus E-Voting: A Correlation Analysis
    Suki, Norazah Mohd
    Suki, Norbayah Mohd
    ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 4946 - 4949
  • [30] Portable E-Voting decision system
    Chemmanam, Ajai J.
    Faris, Salmanul K.
    Sreelekshmi, S.
    Sairam, M. Vasu
    Jose, Bijoy A.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,