A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework

被引:6
|
作者
Khazaei, Shahram [1 ]
Rezaei-Aliabadi, Mehri [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran, Iran
基金
美国国家科学基金会;
关键词
Electronic voting; Formal methods; Provable security; Universal composability framework;
D O I
10.1016/j.jisa.2018.10.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing an efficient and secure electronic voting (e-voting) protocol without the presence of trusted authorities, known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is computed by voters collaborating with each other. We provide a rigorous proof of security of a decentralized e-voting protocol proposed by Khader et al. in the Universal Composability (UC) Framework. This protocol is the state-of-the-art decentralized e-voting protocol in terms of efficiency and security, whose security has only been justified against a set of desired properties required in e-voting protocols. For security analysis of e-voting protocols, intuitive proof is not enough and we require a comprehensive approach that provides provable security. Our result settles this concern. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 6 条
  • [1] An experiment on the security of the Norwegian electronic voting protocol
    Kristian Gjøsteen
    Anders Smedstuen Lund
    Annals of Telecommunications, 2016, 71 : 299 - 307
  • [2] An experiment on the security of the Norwegian electronic voting protocol
    Gjosteen, Kristian
    Lund, Anders Smedstuen
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (7-8) : 299 - 307
  • [3] On the analysis of time-aware protocols in universal composability framework
    István Vajda
    International Journal of Information Security, 2016, 15 : 403 - 412
  • [4] On the analysis of time-aware protocols in universal composability framework
    Vajda, Istvan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (04) : 403 - 412
  • [5] Design and Formal Analysis of Electronic Voting Protocol using AVISPA
    Oo, Htet Ne
    Aung, Aye Moe
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1 - 8
  • [6] FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol
    Feng, Haonan
    Guan, Jingjing
    Li, Hui
    Pan, Xuesong
    Zhao, Ziming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4291 - 4310