Static Validation of a Voting Protocol

The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties.

[1]  Mark Ryan,et al.  Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.

[2]  Flemming Nielson,et al.  Flow Logics for Constraint Based Analysis , 1998, CC.

[3]  Flemming Nielson,et al.  Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[4]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[5]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[6]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[7]  Flemming Nielson,et al.  Validating firewalls using flow logics , 2002, Theor. Comput. Sci..

[8]  Flemming Nielson,et al.  Automated Analysis of Security in Networking Systems , 2004 .

[9]  Mark A. Herschberg,et al.  Secure electronic voting over the World Wide Web , 1997 .

[10]  Hanne Riis Nielson,et al.  Using static analysis to validate the SAML single sign-on protocol , 2005, WITS '05.

[11]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[12]  Flemming Nielson,et al.  Principles of Program Analysis , 1999, Springer Berlin Heidelberg.

[13]  Kazue Sako,et al.  Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.

[14]  Amerson H Lin Automated Analysis of Security APIs , 2005 .

[15]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[16]  Martín Abadi,et al.  Security Protocols and Specifications , 1999, FoSSaCS.

[17]  Flemming Nielson,et al.  A Succinct Solver for ALFP , 2002, Nord. J. Comput..

[18]  Davide Sangiorgi,et al.  Communicating and Mobile Systems: the π-calculus, , 2000 .

[19]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[20]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[21]  Flemming Nielson,et al.  A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.

[22]  Alan Bundy,et al.  Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.

[23]  Hubert Comon,et al.  Tree automata techniques and applications , 1997 .

[24]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[25]  Moni Naor,et al.  Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.

[26]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[27]  C. A. R. Hoare,et al.  Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.

[28]  Flemming Nielson,et al.  Flow Logic: A Multi-paradigmatic Approach to Static Analysis , 2002, The Essence of Computation.

[29]  Flemming Nielson,et al.  Static validation of security protocols , 2005, J. Comput. Secur..

[30]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[31]  Robin Milner,et al.  Communicating and mobile systems - the Pi-calculus , 1999 .

[32]  Lorrie Faith Cranor,et al.  Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .

[33]  Josh Benaloh Verifiable secret-ballot elections , 1987 .