Reference : Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and...
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/45565
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
English
Baloglu, Sevdenur mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Mauw >]
Bursuc, Sergiu mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Mauw >]
Mauw, Sjouke mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Pang, Jun mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Jun-2021
IEEE 34th Computer Security Foundations Symposium, Dubrovnik 21-25 June 2021
IEEE Computer Society
Yes
978-1-7281-7607-9
Los Alamitos, CA
USA
IEEE 34th Computer Security Foundations Symposium (CSF)
from 21-06-2021 to 25-06-2021
[en] foundations / applications ; electronic voting ; formal verification
[en] Election verifiability aims to ensure that the outcome produced by electronic voting systems correctly reflects the intentions of eligible voters, even in the presence of an adversary that may corrupt various parts of the voting infrastructure. Protecting such systems from manipulation is challenging because of their distributed nature involving voters, election authorities, voting servers and voting platforms. An adversary corrupting any of these can make changes that, individually, would go unnoticed, yet in the end will affect the outcome of the election. It is, therefore, important to rigorously evaluate whether the measures prescribed by election verifiability achieve their goals. We propose a formal framework that allows such an evaluation in a systematic and automated way. We demonstrate its application to the verification of various scenarios in Helios and Belenios, two prominent internet voting systems, for which we capture features and corruption models previously outside the scope of formal verification. Relying on the Tamarin protocol prover for automation, we derive new security proofs and attacks on deployed versions of these protocols, illustrating trade-offs between usability and security.
R-AGR-3433-11
Researchers ; Professionals ; Students
http://hdl.handle.net/10993/45565
10.1109/CSF51468.2021.00019
https://www.computer.org/csdl/proceedings-article/csf/2021/760700a281/1tzsouCwfh6

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
main.pdfPublisher postprint362.2 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.