30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18 CHAPTER 1. INTRODUCTION<br />

1.5.3 Chapter 7: <strong>Analysis</strong> <strong>of</strong> electronic voting protocols: “voter verifiability”<br />

property<br />

In Chapter 7, we study a specific class <strong>of</strong> cryptographic protocols: the<br />

“electronic-voting” protocols for which we analyse the “voter verifiability property”.<br />

The voter verifiability property includes the the individual verifiability <strong>and</strong><br />

universal verifiability properties. Intuitively, the individual verifiability property<br />

mans that a voter can check whether her ballot was included in the tally, <strong>and</strong><br />

the universal verifiability property means that anybody can check the correctness<br />

<strong>of</strong> the published outcome. We formally define these two properties, <strong>and</strong> that<br />

using the applied pi calculus [11] which is well-suited for modelling security protocols<br />

<strong>and</strong> in particular electronic voting protocols [97, 25]. We apply our definition<br />

to some well-known e-voting protocols such as the protocol due to Fujioka,<br />

Okamoto & Ohta [115] <strong>and</strong> Lee et al. [141], <strong>and</strong> show that both protocols are<br />

voter verifiable according to our definition.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!