Back to Search Start Over

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co

Authors :
Constantin Catalin Dragan
Francois Dupressoir
Ehsan Estaji
Kristian Gjosteen
Thomas Haines
Peter Y.A. Ryan
Peter B. Ronne
Morten Rotvold Solberg
University of Surrey (UNIS)
University of Bristol [Bristol]
University of Luxembourg [Luxembourg]
NTNU Samfunnsforskning AS / NTNU Social Research
Norwegian University of Science and Technology [Trondheim] (NTNU)
Norwegian University of Science and Technology (NTNU)-Norwegian University of Science and Technology (NTNU)
Australian National University (ANU)
Proof techniques for security protocols (PESTO)
Inria Nancy - Grand Est
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM)
Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA)
Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA)
Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)
Source :
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
Publication Year :
2022
Publisher :
IEEE, 2022.

Abstract

International audience; Privacy is a notoriously difficult property to achieve in complicated systems and especially in electronic voting schemes. Moreover, electronic voting schemes is a class of systems that require very high assurance. The literature contains a number of ballot privacy definitions along with security proofs for common systems. Some machine-checked security proofs have also appeared. We define a new ballot privacy notion that captures a larger class of voting schemes. This notion improves on the state of the art by taking into account that verification in many schemes will happen or must happen after the tally has been published, not before as in previous definitions. As a case study we give a machine-checked proof of privacy for Selene, which is a remote electronic voting scheme which offers an attractive mix of security properties and usability. Prior to our work, the computational privacy of Selene has never been formally verified. Finally, we also prove that MiniVoting and Belenios satisfies our definition.

Details

Language :
English
Database :
OpenAIRE
Journal :
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
Accession number :
edsair.doi.dedup.....98867021fc8c5c34f01991b5ea118033
Full Text :
https://doi.org/10.1109/CSF54842.2022.9919663⟩