2019 IEEE European Symposium on Security and Privacy (EuroS&P) 2019
DOI: 10.1109/eurosp.2019.00052
|View full text |Cite
|
Sign up to set email alerts
|

Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions

Abstract: We advance the state-of-the-art in automated symbolic analysis of ballot secrecy for e-voting protocols by proposing a method based on analysing three conditions that together imply ballot secrecy. Our approach has two main advantages over existing automated approaches. The first is a substantial expansion of the class of protocols and threat models that can be automatically analysed: our approach can systematically deal with (a) honest authorities present in different phases, (b) threat models in which no dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The most important objective of PPCA, i.e., the secrecy of the location of the participating entities, has been formally verified using the formal verification tool ProVerif [41], in line with many recent scientific contributions on network security [42], [43], [44]. ProVerif is definitely the most correct choice for security analysis when applying a cryptographic primitive in a new application, in combination with additional security services and functionalities.…”
Section: Formal Verification Using Proverifmentioning
confidence: 80%
“…The most important objective of PPCA, i.e., the secrecy of the location of the participating entities, has been formally verified using the formal verification tool ProVerif [41], in line with many recent scientific contributions on network security [42], [43], [44]. ProVerif is definitely the most correct choice for security analysis when applying a cryptographic primitive in a new application, in combination with additional security services and functionalities.…”
Section: Formal Verification Using Proverifmentioning
confidence: 80%
“…without time and location considerations. It has been successfully applied to secure messaging protocols [43], e-voting schemes [21,39], or avionic protocols [12]. ProVerif allows to model a wide class of cryptographic primitives like symmetric/asymmetric encryption, signatures, hash functions... and describes protocols through a process algebra close to the one presented in Section 3.2.1.…”
Section: Proverif In a Nutshellmentioning
confidence: 99%
“…It handles an unbounded number of sessions and even if termination is not guaranteed, it works well in practice. For instance, this tool has been successfully used to analyse two avionic protocols that aim to secure air-ground communications [5], to perform a comprehensive analysis of the TLS 1.3 Draft-18 protocol [6], or more recently to analyse some e-voting protocols [10,17].…”
Section: Proverif In a Nutshellmentioning
confidence: 99%