{"title":"A Formal Analysis of Coercion-Resistance of the Internet Voting Protocol Based on DKR Formal Model","authors":"Bo Meng","doi":"10.1109/ISIP.2008.29","DOIUrl":null,"url":null,"abstract":"The practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, invariableness, universal verifiability, receipt-freeness and coercion-resistance. Formal method is an important tool to assess coercion-resistance of internet voting protocols. But the coercion-resistance of many Internet voting protocols is analyzed without formal method. The applied pi calculus can be used to model and verify the security protocols, such as internet voting protocol. In this paper, firstly, we research the coercion-resistance . Then we model a typical internet voting protocol with applied pi calculus. Thirdly we analyze the typical internet voting protocol with DKR coercion-resistance formal model. According to the result of analysis we point out that the typical protocol is coercion-resistance.","PeriodicalId":103284,"journal":{"name":"2008 International Symposiums on Information Processing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposiums on Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIP.2008.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, invariableness, universal verifiability, receipt-freeness and coercion-resistance. Formal method is an important tool to assess coercion-resistance of internet voting protocols. But the coercion-resistance of many Internet voting protocols is analyzed without formal method. The applied pi calculus can be used to model and verify the security protocols, such as internet voting protocol. In this paper, firstly, we research the coercion-resistance . Then we model a typical internet voting protocol with applied pi calculus. Thirdly we analyze the typical internet voting protocol with DKR coercion-resistance formal model. According to the result of analysis we point out that the typical protocol is coercion-resistance.