Vis enkel innførsel

dc.contributor.authorDrăgan, Constantin Cătălin
dc.contributor.authorDupressoir, François
dc.contributor.authorEstaji, Ehsan
dc.contributor.authorGjøsteen, Kristian
dc.contributor.authorHaines, Thomas
dc.contributor.authorRyan, Peter Y. A.
dc.contributor.authorRønne, Peter B.
dc.contributor.authorSolberg, Morten Rotvold
dc.date.accessioned2022-12-08T10:10:12Z
dc.date.available2022-12-08T10:10:12Z
dc.date.created2022-11-03T10:48:47Z
dc.date.issued2022
dc.identifier.isbn978-1-6654-8417-6
dc.identifier.urihttps://hdl.handle.net/11250/3036708
dc.description.abstractPrivacy is a notoriously difficult property to achieve in complicated systems and especially in electronic voting schemes. Moreover, electronic voting schemes is a class of systems that require very high assurance. The literature contains a number of ballot privacy definitions along with security proofs for common systems. Some machine-checked security proofs have also appeared. We define a new ballot privacy notion that captures a larger class of voting schemes. This notion improves on the state of the art by taking into account that verification in many schemes will happen or must happen after the tally has been published, not before as in previous definitions. As a case study we give a machine-checked proof of privacy for Selene, which is a remote electronic voting scheme which offers an attractive mix of security properties and usability. Prior to our work, the computational privacy of Selene has never been formally verified. Finally, we also prove that MiniVoting and Belenios satisfies our definition.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.relation.ispartof2022 IEEE 35th Computer Security Foundations Symposium (CSF)
dc.titleMachine-Checked Proofs of Privacy Against Malicious Boards for Selene & Coen_US
dc.title.alternativeMachine-Checked Proofs of Privacy Against Malicious Boards for Selene & Coen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.source.pagenumber319-331en_US
dc.identifier.cristin2068501
dc.relation.projectNorges forskningsråd: 275516en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel