Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
نویسندگان
چکیده
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresistance in applied pi calculus. Meng protocol is one of the leading remote internet voting protocols that claims to satisfy formal definitions of key properties, such as soundness, individual verifiability, as well as receipt-freeness and coercion resistance with weak physical constrains. But in his paper the analysis of its claimed security properties is finished in manual way which depends on experts’ knowledge and skill and is prone to make mistakes. Owning to the contribution of Backes et al., Meng protocol can be analyzed with automatic tool.In this study firstly the review of the formal method of security protocols are introduced then applied pi calculus and the automatic tool ProVerif are examined. Thirdly Meng protocol is modeled in applied pi calculus. Finally security properties, including soundness and coercion resistance, are verified with ProVerif, a resolution-based theorem prover for security protocols. The result we obtain is that Meng protocol has coercion resistance. But it has not soundness because ProVerif found an attack on soundness. Finally the improvement of Meng protocol is proposed, and also modeled in applied pi calculus and automatically analyzed in ProVerif. The result we get is that the improvement of Meng protocol has soundness. To our best knowledge, the first automated analysis of Meng protocol for an unbounded number of honest and corrupted voters is finished
منابع مشابه
Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif
Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an important role in remote voting protocols. Recently Meng et al. proposed a secure remote internet voting protocol that claims to satisfy formal definitions of key properties without physical constrains. In this study firstly the review of the formal model of resistance of de...
متن کاملAnalysis of Receipt-freeness in the Internet Voting Protocol with Applied Pi Calculus
The practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, and invariableness, universal verifiability, receipt-freeness, and coercion-resistance. Privacy describes the fact that a particular vote in a particular way is not revealed to anyone. Receipt-freeness means that the voter can not produce a receipt to prove that he votes ...
متن کاملAutomatic Verification of Acquisti Voting Protocol in Formal Model
In this paper Acquisti voting protocol is modeled in applied pi calculus. Soundness and coercion-resistance are verified with the automatic tool ProVerif. The result shows that Acquisti protocol has the soundness and coercion-resistance in some conditions. To our best knowledge, the first automatic analysis of Acquisti protocol for an unbounded number of honest and corrupted voters is
متن کاملAnalysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. The applied pi calculus is a formalism for modelling such protocols, and allows us to verify properties by using ...
متن کاملDISSERTATION Defense held on 18 / 11 / 2013 in Luxembourg to obtain the degree of DOCTEUR DE L ’ UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE
Privacy protection is an important requirement in both everyday life and the Inter-net. As the Internet is an open network, adversaries can observe and manipulate data flowing over it. To ensure privacy in communications over open networks, cryptographic protocols have been widely used, and thus, proposing such protocols has become a popular research area. However, design of cryptographic proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDCTA
دوره 4 شماره
صفحات -
تاریخ انتشار 2010