Applying a Dependency Mechanism for Voting Protocol Models Using Event-B

The design of e-voting systems requires the use of techniques which guarantee that the resulting system is safe, secure and preserves privacy. We develop Event-B models of a voting system, by applying a decomposition pattern and a technique of contextualisation, using a dependency mechanism. Through refinement, we take into account the precise regulation and structure of a specific voting process, and reason formally about the system’s resistence to common attacks and threats.

[1]  John McCarthy,et al.  Notes on Formalizing Context , 1993, IJCAI.

[2]  Vanessa Teague,et al.  A review of E-voting: the past, present and future , 2016, Ann. des Télécommunications.

[3]  William Yurcik,et al.  Threat Modeling as a Basis for Security Requirements , 2005 .

[4]  Richard Dapoigny,et al.  Modeling Contexts with Dependent Types , 2010, Fundam. Informaticae.

[5]  Leslie Lamport,et al.  The temporal logic of actions , 1994, TOPL.

[6]  Dominique Méry,et al.  Towards an integrated formal method for verification of liveness properties in distributed systems: with application to population protocols , 2017, Software & Systems Modeling.

[7]  Andreas Fürst,et al.  Event-B patterns and their tool support , 2009, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods.

[8]  Dominique Méry,et al.  Proof-Based Design of Security Protocols , 2010, CSR.

[9]  Nazim Benassa Modelling Attacker's Knowledge for Cascade Cryptographic Protocols , 2008, ABZ.

[10]  Mark Ryan,et al.  Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.

[11]  Jean-Raymond Abrial,et al.  Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.

[12]  Jon Barwise,et al.  On Conditionals: CONDITIONALS AND CONDITIONAL INFORMATION , 1986 .

[13]  Véronique Cortier,et al.  A generic construction for voting correctness at minimum cost - Application to Helios , 2013, IACR Cryptol. ePrint Arch..

[14]  J. Paul Gibson,et al.  Feature Interactions in a Software Product Line for E-voting , 2009, ICFI.

[15]  Lichun Chiang,et al.  Trust and security in the e-voting system , 2009, Electron. Gov. an Int. J..

[16]  Dines Bjørner,et al.  Software Engineering 3 - Domains, Requirements, and Software Design , 2006, Texts in Theoretical Computer Science. An EATCS Series.

[17]  Simon L. Peyton Jones,et al.  Roadmap for enhanced languages and methods to aid verification , 2006, GPCE '06.