Reference : Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallo...
Scientific journals : Article
Engineering, computing & technology : Computer science
Security, Reliability and Trust
Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting Protocol
Belardinelli, Francesco [> >]
Condurache, Rodica [> >]
Dima, Catalin [> >]
Jamroga, Wojciech mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA >]
Knapik, Michał [> >]
Information and Computation
Article 104552
Yes (verified by ORBilu)
[en] Alternating-time Temporal Logic ; Voting Protocols ; Formal Verification
[en] We propose a notion of alternating bisimulation for strategic abilities under imperfect information. The bisimulation preserves formulas of ATL$^*$ for both the {\em objective} and {\em subjective} variants of the state-based semantics with imperfect information, which are commonly used in the modeling and verification of multi-agent systems. Furthermore, we apply the theoretical result to the verification of coercion-resistance in the ThreeBallot voting system, a voting protocol that does not use cryptography. In particular, we show that natural simplifications of an initial model of the protocol are in fact bisimulations of the original model, and therefore satisfy the same ATL$^*$ properties, including coercion-resistance. These simplifications allow the model-checking tool MCMAS to terminate on models with a larger number of voters and candidates, compared with the initial model.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA)
FnR ; FNR10415467 > Peter Y. A. Ryan > VoteVerif > Verification Of Voter-verifiable Voting Protocols > 01/09/2016 > 31/08/2019 > 2015

File(s) associated to this reference

Fulltext file(s):

Limited access
bisimulation21i+c[1].pdfAuthor preprint607.42 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.