A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework

被引:6
|
作者
Khazaei, Shahram [1 ]
Rezaei-Aliabadi, Mehri [1 ]
机构
[1] Sharif Univ Technol, Dept Math Sci, Tehran, Iran
基金
美国国家科学基金会;
关键词
Electronic voting; Formal methods; Provable security; Universal composability framework;
D O I
10.1016/j.jisa.2018.10.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing an efficient and secure electronic voting (e-voting) protocol without the presence of trusted authorities, known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is computed by voters collaborating with each other. We provide a rigorous proof of security of a decentralized e-voting protocol proposed by Khader et al. in the Universal Composability (UC) Framework. This protocol is the state-of-the-art decentralized e-voting protocol in terms of efficiency and security, whose security has only been justified against a set of desired properties required in e-voting protocols. For security analysis of e-voting protocols, intuitive proof is not enough and we require a comprehensive approach that provides provable security. Our result settles this concern. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 33 条
  • [1] Evaluating security of voting schemes in the universal composability framework
    Groth, J
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 46 - 60
  • [2] Universal composability framework for analysis of proxy threshold signature
    Hong X.
    Li X.-X.
    Gong Z.
    Chen K.-F.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 107 - 111
  • [3] A Universal Composability Framework for Analysis of Proxy Threshold Signature
    洪璇
    李详学
    龚征
    陈克非
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 107 - 111
  • [4] An experiment on the security of the Norwegian electronic voting protocol
    Gjosteen, Kristian
    Lund, Anders Smedstuen
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (7-8) : 299 - 307
  • [5] An experiment on the security of the Norwegian electronic voting protocol
    Kristian Gjøsteen
    Anders Smedstuen Lund
    Annals of Telecommunications, 2016, 71 : 299 - 307
  • [6] Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol
    Qiu, Shujing
    Xin, Xiangjun
    Qian, Zheng
    Li, Chaoyang
    Li, Fagen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (03)
  • [7] Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol
    Qiu Shujing
    Xin Xiangjun
    Zheng qian
    Li Chaoyang
    Li Fagen
    International Journal of Theoretical Physics, 63
  • [8] On the analysis of time-aware protocols in universal composability framework
    István Vajda
    International Journal of Information Security, 2016, 15 : 403 - 412
  • [9] On the analysis of time-aware protocols in universal composability framework
    Vajda, Istvan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (04) : 403 - 412
  • [10] Security Analysis Of The Electronic Voting Protocol Based On Blind Intermediaries Using The SPIN Verifier
    Babenko, Liudmila
    Pisarev, Ilya
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 43 - 48