Abstract—In this paper we review a wide range of existing definitions for anonymity defined in different formal languages from the literature. Moreover, we discuss anonymity definitions for voting systems and model the specifications using Commu-nicating Sequential Processes (CSP). In addition, we formalise conventional voting system with CSP and analyse whether our voting system design satisfies the anonymity requirement with two different definitions, strong and weak anonymity. Further-more, we highlight the difference between strong and weak anonymity definitions regarding voting systems with a case study on conventional voting system. Finally, we conclude with the results taken from our model analysis, which expresses that the strong an...
Security protocols are designed to meet particular security properties. In order to analyse such pro...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...
technical reportWe present a formal definition of anonymity in the context of concurrent processes. ...
Abstract. We present formal definitions of anonymity for voting protocols using the process algebra ...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
AbstractWe study one of the many aspects of privacy, which is referred to as data anonymity, in a fo...
10th International Conference on Integrated Formal Methods (IFM) -- JUN 10-14, 2013 -- Turku, FINLAN...
Electronic voting can be seen as one of the best alternatives of today’s election for it will provid...
Abstract. Anonymity and verifiability are crucial security requirements for voting. Still, they seem...
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal con...
In recent years, a large number of secure voting protocols have been proposed in the literature. Oft...
International audienceIn an election, it is imperative that the vote of the single voters remain ano...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Security protocols are designed to meet particular security properties. In order to analyse such pro...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...
technical reportWe present a formal definition of anonymity in the context of concurrent processes. ...
Abstract. We present formal definitions of anonymity for voting protocols using the process algebra ...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
AbstractWe study one of the many aspects of privacy, which is referred to as data anonymity, in a fo...
10th International Conference on Integrated Formal Methods (IFM) -- JUN 10-14, 2013 -- Turku, FINLAN...
Electronic voting can be seen as one of the best alternatives of today’s election for it will provid...
Abstract. Anonymity and verifiability are crucial security requirements for voting. Still, they seem...
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal con...
In recent years, a large number of secure voting protocols have been proposed in the literature. Oft...
International audienceIn an election, it is imperative that the vote of the single voters remain ano...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Security protocols are designed to meet particular security properties. In order to analyse such pro...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...
technical reportWe present a formal definition of anonymity in the context of concurrent processes. ...