Abstract. We present formal definitions of anonymity for voting protocols using the process algebra CSP. We analyse a number of anonymity definitions, and give formal definitions for strong and weak anonymity by highlighting the difference between these definitions. We show that the strong anonymity definition is too strong, whereas the weak anonymity definition is shown to be a suitable property for analysing voting systems. We model and analyse a conventional voting system, and Prêt a ̀ Voter, a paper-based, voter-verifiable e-voting system, as two case studies to demonstrate the validity of our formal definitions by specification checks using the trace equivalence notion in CSP and the refinement checker Failures-Divergences Refinement ...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we formally study important properties of electronic voting protocols. In particular w...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...
Abstract—In this paper we review a wide range of existing definitions for anonymity defined in diffe...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Electronic voting can be seen as one of the best alternatives of today’s election for it will provid...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
AbstractWe study one of the many aspects of privacy, which is referred to as data anonymity, in a fo...
Abstract. Anonymity and verifiability are crucial security requirements for voting. Still, they seem...
10th International Conference on Integrated Formal Methods (IFM) -- JUN 10-14, 2013 -- Turku, FINLAN...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
In recent years, a large number of secure voting protocols have been proposed in the literature. Oft...
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal con...
Abstract: Voter privacy and verifiability are fundamental security concepts for elec-tronic voting. ...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we formally study important properties of electronic voting protocols. In particular w...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...
Abstract—In this paper we review a wide range of existing definitions for anonymity defined in diffe...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Electronic voting can be seen as one of the best alternatives of today’s election for it will provid...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
AbstractWe study one of the many aspects of privacy, which is referred to as data anonymity, in a fo...
Abstract. Anonymity and verifiability are crucial security requirements for voting. Still, they seem...
10th International Conference on Integrated Formal Methods (IFM) -- JUN 10-14, 2013 -- Turku, FINLAN...
International audienceNowadays, it is a well-known fact that only formal methods can provide a proof...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
In recent years, a large number of secure voting protocols have been proposed in the literature. Oft...
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal con...
Abstract: Voter privacy and verifiability are fundamental security concepts for elec-tronic voting. ...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we formally study important properties of electronic voting protocols. In particular w...
A wealth of protocols for electronic voting have been proposed in the literature over the past years...