Sciweavers

Share
JDCTA
2010

Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus

9 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresistance in applied pi calculus. Meng protocol is one of the leading remote internet voting protocols that claims to satisfy formal definitions of key properties, such as soundness, individual verifiability, as well as receipt-freeness and coercion resistance with weak physical constrains. But in his paper the analysis of its claimed security properties is finished in manual way which depends on experts' knowledge and skill and is prone to make mistakes. Owning to the contribution of Backes et al., Meng protocol can be analyzed with automatic tool.In this study firstly the review of the formal...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
Added 19 May 2011
Updated 19 May 2011
Type Journal
Year 2010
Where JDCTA
Authors Bo Meng, Wei Huang, Zimao Li, Dejun Wang
Comments (0)
books