Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mCRL2

نویسندگان

  • H. R. Mahrooghi
  • M. H. Haghighat
  • R. Jalili
  • Hamid Reza Mahrooghi
  • Mohammad Hashem Haghighat
  • Rasool Jalili
چکیده

Having a doubtless election in the information technology era requires satisfaction and verification of security properties in electronic voting (e-voting) systems. This paper focuses on verification of authentication-type properties of an e-voting protocol. The well-known FOO92 e-voting protocol is analyzed, as a case study, against the uniqueness and eligibility properties and their satisfaction are verified. By means of an automated formal approach, the protocol is modelled in the mCRL2 language, which is a combination of the ACP process algebra language and abstract data types (ADT). Then, the eligibility and uniqueness properties as two authentication-type requirements are modelled in the modal μ-calculus. These are given to a combination of dedicated mCRL2 tools to verify the properties. Our research is valuable due to its direct modelling of authentication-type properties and their verification. The experiment can be easily generalized as a pattern for verification of similar protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Analysis of Secure Electronic Voting System

-In this technological and knowledge age, e-commerce related matters become popular. Electronic voting is one of these matters and it is able to provide convenient, less expensive, fast and secure facilities. Important basic properties of electronic voting are fairness, privacy, eligibility, receiptfreeness, coercion-resistance and verifiability. Current electronic voting systems satisfy only s...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Verifying equivalence properties of security protocols

Security protocols are used nowadays for securing transactions through public channels, like the Internet. Typical examples of applications include electronic commerce, electronic voting or mobile ad hoc networking. In order to obtain as much confidence as possible, several formal methods have been proposed for analyzing properties of security protocols. Depending on the goals which a security ...

متن کامل

Modelling and Analysing a WSN Secure Aggregation Protocol: A Comparison of Languages and Tool Support

A security protocol promises protection of a significant piece of information while using it for a specific purpose. Here, the protection of the information is vital and a formal verification of the protocol is an essential step towards guaranteeing this protection. In this work, we study a secure aggregation protocol (SHIA) for Wireless Sensor Networks and verify the protocol in three formal m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010