Improving automated symbolic analysis of ballot secrecy for e-voting protocols: A method based on sufficient conditions

8Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We advance the state-of-the-art in automated symbolic analysis of ballot secrecy for e-voting protocols by proposing a method based on analysing three conditions that together imply ballot secrecy. Our approach has two main advantages over existing automated approaches. The first is a substantial expansion of the class of protocols and threat models that can be automatically analysed: Our approach can systematically deal with (a) honest authorities present in different phases, (b) threat models in which no dishonest voters occur, and (c) protocols whose ballot secrecy depends on fresh data coming from other phases. The second advantage is that our approach can significantly improve verification efficiency, as the individual conditions are often simpler to verify. E.g., for the LEE protocol, we obtain a speedup of over two orders of magnitude. We show the scope and effectiveness of our approach using ProVerif in several case studies, including the FOO, LEE, JCJ, and Belenios protocols.

Cite

CITATION STYLE

APA

Hirschi, L., & Cremers, C. (2019). Improving automated symbolic analysis of ballot secrecy for e-voting protocols: A method based on sufficient conditions. In Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019 (pp. 635–650). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/EuroSP.2019.00052

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free