loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Denis Butin 1 and Giampaolo Bella 2

Affiliations: 1 Dublin City University, Ireland ; 2 Università di Catania and De Montfort University, Italy

ISBN: 978-989-8565-24-2

Keyword(s): e-Voting, Privacy, Inductive Method.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Formal Methods for Security ; Information and Systems Security ; Privacy ; Security Protocols

Abstract: While machine-assisted verification of classical security goals such as confidentiality and authentication is well-established, it is less mature for recent ones. Electronic voting protocols claim properties such as voter privacy. The most common modelling involves indistinguishability, and is specified via trace equivalence in cryptographic extensions of process calculi. However, it has shown restrictions. We describe a novel model, based on unlinkability between two pieces of information. Specifying it as an extension to the Inductive Method allows us to establish voter privacy without the need for approximation or session bounding. The two models and their latest specifications are contrasted.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.29.226

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Butin, D. and Bella, G. (2012). Verifying Privacy by Little Interaction and No Process Equivalence.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 251-256. DOI: 10.5220/0004043502510256

@conference{secrypt12,
author={Denis Butin. and Giampaolo Bella.},
title={Verifying Privacy by Little Interaction and No Process Equivalence},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={251-256},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004043502510256},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Verifying Privacy by Little Interaction and No Process Equivalence
SN - 978-989-8565-24-2
AU - Butin, D.
AU - Bella, G.
PY - 2012
SP - 251
EP - 256
DO - 10.5220/0004043502510256

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.