Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus

  • Authors:
  • Michael Backes;Catalin Hritcu;Matteo Maffei

  • Affiliations:
  • -;-;-

  • Venue:
  • CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this paper, we provide novel definitions that address several important security properties. In particular, we propose a new formalization of coercion-resistance in terms of observational equivalence. In contrast to previous definitions in the symbolic model, our definition of coercion-resistance is suitable for automation and captures simulation and forced-abstention attacks. Additionally, we express inalterability, eligibility, and non-reusability as a correspondence property on traces. In the second part, we use ProVerif to illustrate the feasibility of our technique by providing the first automated security proof of the coercion-resistant protocol proposed by Juels, Catalano, and Jakobsson.