2014
DOI: 10.1007/978-3-319-08587-6_2
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Voting: How Logic Can Help

Abstract: Electronic voting should offer at least the same guarantees than traditional paper-based voting systems. In order to achieve this, electronic voting protocols make use of cryptographic primitives, as in the more traditional case of authentication or key exchange protocols. All these protocols are notoriously difficult to design and flaws may be found years after their first release. Formal models, such as process algebra, Horn clauses, or constraint systems, have been successfully applied to automatically anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 60 publications
(45 reference statements)
0
2
0
Order By: Relevance
“…There are many works on electronic voting using the applied pi-calculus or a similar calculus to model the protocol (see, e.g., [21,7,14,15,17,19] to name a few). The voting privacy goal is usually then expressed by the following trick: consider two processes that differ only in the concrete vote of two (honest) voters who swap their vote; then any such pair of processes must be indistinguishable.…”
Section: Modeling E-votingmentioning
confidence: 99%
“…There are many works on electronic voting using the applied pi-calculus or a similar calculus to model the protocol (see, e.g., [21,7,14,15,17,19] to name a few). The voting privacy goal is usually then expressed by the following trick: consider two processes that differ only in the concrete vote of two (honest) voters who swap their vote; then any such pair of processes must be indistinguishable.…”
Section: Modeling E-votingmentioning
confidence: 99%
“…Recently, new symbolic methods have been proposed [15]- [19] to analyse e-voting protocols. However, the applicability of these methods is still extremely limited both in the type of protocols that they can deal with and the type of security properties (including threat models) that they analyse (as acknowledged by [14], [17], [20]). The reasons for these limitations interact in a complex way with existing approaches.…”
Section: Introductionmentioning
confidence: 99%