首页> 外文会议>International conference on cryptology in India >Electronic Voting: How Formal Methods Can Help
【24h】

Electronic Voting: How Formal Methods Can Help

机译:电子投票:形式方法如何提供帮助

获取原文

摘要

Electronic voting is now used in many countries and in many elections, from small elections such as parents representatives in schools, to politically binding elections. Electronic voting facilitates counting and enables a wide variety of elections, such as preferential voting where voters rank their candidates by order of preference. In such a case, counting the votes by hand can be a very complex task that can, in contrast, easily be handled by a computer. Another advantage of electronic voting is that voters may vote from anywhere and it can last several weeks if needed. It is often used at least as a replacement of postal voting. However, electronic voting also comes with security threats and has been subject to severe attacks. For example, the Washington, D.C., Internet voting system has been attacked [7], during a trial just before the election. Recently, Switzerland has stopped temporarily using electronic voting after a public penetration test that has revealed severe weaknesses [6]. Ideally, electronic voting should offer the same guarantees that traditional paper-based election. In particular, it should guarantee vote privacy (no one should know how I voted) and verifiability: anyone should be able to check that the votes are accurately counted and correspond to the voters intent. In this talk, we will present the Belenios voting protocol [4] that has been used in more than 500 elections in 2020, through its voting platform1. We will discuss its security properties as well as its limitations. As for security protocols in general, the design of electronic voting systems is error-prone and it is hard to assess whether a protocol ensures the required security properties. For these reasons, a common good practice is to design a protocol together with a formal security analysis, as it has been done in the context of TLS1.3 [5] for example. The Swiss Chancellerie requires both computational and formal proofs of security before the deployment of an electronic voting system [1]. We will explain how the tools developed for the automated analysis of security protocols, like ProVerif [3], can help gaining a better confidence in e-voting protocols. One particular issue in the context of voting is that the formalization of security properties is still an on-going work, even for crucial properties like vote secrecy [2]. Hence electronic voting still raises many challenges for our research community.
机译:电子投票现已在许多国家和许多选举中使用,从学校的父母代表等小选举中,在政治约束选举中。电子投票有助于计数并实现各种选举,例如优惠投票,选民按优先顺序排列候选人。在这种情况下,手动计数投票可以是一个非常复杂的任务,可以相比可以容易地由计算机处理。电子投票的另一个优点是选民可以从任何地方投票,如果需要,它可以持续数周。它通常至少用于销量替代品。然而,电子投票也具有安全威胁,并受到严重攻击的影响。例如,华盛顿,D.C.,互联网投票系统已被攻击[7],在选举前的审判期间。近日,瑞士在公共渗透试验后暂时停止使用电子投票,揭示严重弱点[6]。理想情况下,电子投票应提供相同的保证,即传统的纸质大选。特别是,它应该保证投票隐私(没有人应该知道如何投票)和可验证:任何人都应该能够检查投票是否准确地计算并对应于选民意图。在这次谈判中,我们将介绍Belenios投票议定书[4],这些议定书[4]已通过其投票平台1在2020年的500多个选举中使用。我们将讨论其安全性质以及其限制。至于安全协议通常,电子投票系统的设计是容易出错的,并且很难评估协议是否确保所需的安全性。由于这些原因,常见的好方法是与正式安全分析一起设计协议,因为它在TLS1.3 [5]的上下文中已经完成。在部署电子投票系统之前,瑞士校长需要计算和正式的安全证明[1]。我们将解释如何为安全协议自动分析开发的工具,如箴言[3],可以帮助对电子投票协议进行更好的信心。投票背景下的一个特定问题是安全物业的正规化仍然是一个持续的工作,即使对于像投票保密的关键属性[2]。因此,电子投票仍然对我们的研究界提出了许多挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号