用圆周率演算形式化和分析Borda协议

B. Kurhade, M. Kshirsagar
{"title":"用圆周率演算形式化和分析Borda协议","authors":"B. Kurhade, M. Kshirsagar","doi":"10.1109/ICPRIME.2013.6496478","DOIUrl":null,"url":null,"abstract":"E-voting systems are important tools for community participation in essential decisions of society. In comparison with traditional voting systems, e-voting systems have special advantages. Any e-voting system is based on an e-voting protocol. The applied pi calculus is a language used to formalise the protocol. It is a language for describing concurrent processes and their intersections. Properties of processes described in the applied pi calculus can be proved by employing manual techniques or by automated tool such as proverif. A potentially much more secure system could be implemented, based on formal protocols that specify the messages sent to electronic voting machines. Such protocols have been studied for several decades. They offer the possibility of abstract analysis of protocol against formally stated properties. Formal verification techniques are notoriously difficult to design and analyse. Our aim is use verification technique to analyse the protocol. This review paper focus on modelling a known protocol for elections known as BORDA in the applied pi calculus, and this paper also focus on formalizing some of its expected properties, namely eligibility, fairness, Receipt freeness, individual verifiability and privacy. The applied pi calculus has a family of proof techniques which we can use is supported by the proverif tool and has been used to analyse a variety of security protocols.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Formalization and analysis of Borda protocol using pi calculus\",\"authors\":\"B. Kurhade, M. Kshirsagar\",\"doi\":\"10.1109/ICPRIME.2013.6496478\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"E-voting systems are important tools for community participation in essential decisions of society. In comparison with traditional voting systems, e-voting systems have special advantages. Any e-voting system is based on an e-voting protocol. The applied pi calculus is a language used to formalise the protocol. It is a language for describing concurrent processes and their intersections. Properties of processes described in the applied pi calculus can be proved by employing manual techniques or by automated tool such as proverif. A potentially much more secure system could be implemented, based on formal protocols that specify the messages sent to electronic voting machines. Such protocols have been studied for several decades. They offer the possibility of abstract analysis of protocol against formally stated properties. Formal verification techniques are notoriously difficult to design and analyse. Our aim is use verification technique to analyse the protocol. This review paper focus on modelling a known protocol for elections known as BORDA in the applied pi calculus, and this paper also focus on formalizing some of its expected properties, namely eligibility, fairness, Receipt freeness, individual verifiability and privacy. The applied pi calculus has a family of proof techniques which we can use is supported by the proverif tool and has been used to analyse a variety of security protocols.\",\"PeriodicalId\":123210,\"journal\":{\"name\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPRIME.2013.6496478\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPRIME.2013.6496478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

电子投票系统是社区参与社会重大决策的重要工具。与传统的投票系统相比,电子投票系统具有特殊的优势。任何电子投票系统都是基于电子投票协议的。应用π演算是一种用于形式化协议的语言。它是一种描述并发进程及其交集的语言。应用圆周率演算中描述的过程的性质可以通过人工技术或自动工具(如proverif)来证明。一个潜在的更安全的系统可以实现,基于正式协议,指定发送到电子投票机的消息。这样的协议已经研究了几十年。它们提供了根据正式声明的属性对协议进行抽象分析的可能性。众所周知,形式化验证技术很难设计和分析。我们的目的是利用验证技术对协议进行分析。这篇综述论文的重点是在应用pi演算中对一个已知的选举协议BORDA进行建模,并重点讨论了它的一些预期属性,即资格、公平性、收据自由、个人可验证性和隐私性。应用π演算有一系列证明技术,我们可以使用proverif工具支持,并已用于分析各种安全协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Formalization and analysis of Borda protocol using pi calculus
E-voting systems are important tools for community participation in essential decisions of society. In comparison with traditional voting systems, e-voting systems have special advantages. Any e-voting system is based on an e-voting protocol. The applied pi calculus is a language used to formalise the protocol. It is a language for describing concurrent processes and their intersections. Properties of processes described in the applied pi calculus can be proved by employing manual techniques or by automated tool such as proverif. A potentially much more secure system could be implemented, based on formal protocols that specify the messages sent to electronic voting machines. Such protocols have been studied for several decades. They offer the possibility of abstract analysis of protocol against formally stated properties. Formal verification techniques are notoriously difficult to design and analyse. Our aim is use verification technique to analyse the protocol. This review paper focus on modelling a known protocol for elections known as BORDA in the applied pi calculus, and this paper also focus on formalizing some of its expected properties, namely eligibility, fairness, Receipt freeness, individual verifiability and privacy. The applied pi calculus has a family of proof techniques which we can use is supported by the proverif tool and has been used to analyse a variety of security protocols.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信