An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols

Publish Year: 1398
نوع سند: مقاله ژورنالی
زبان: English
View: 177

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-6-1_004

تاریخ نمایه سازی: 19 بهمن 1399

Abstract:

CryptoPAi is a hybrid operational-epistemic framework for specification and analysis of security protocols with genuine support for cryptographic constructs. This framework includes a process algebraic formalism for the operational specification and an epistemic extension of modal mu-calculus with past for the property specification. In this paper, we extend CryptoPAi framework with more cryptographic constructs. The main practical motivation for this work came from the domain of e-voting protocols and then we investigate the applicability of the extended framework in this domain. The framework provides explicit support for cryptographic constructs, which is among the most essential ingredients of security and e-voting protocols. Some more advanced cryptographic constructs are provided to allow specifying the behavior ofmore protocols in our process language and then verifying properties expressed in our logic with both temporal and epistemic operators.We apply our extended framework to the FOO e-voting protocol. We also promote the prototype model-checker of the framework in the Maude rewriting logic tool and apply it to model-check some specified properties on their corresponding models.

Keywords:

Process Algebra , E-voting Protocols , Formal Specification and Verification , CryptoPAi

Authors

Hamid Reza Mahrooghi

Computer Group, International University of Imamreza

Rasool Jalili

Sharif University of Technology, Computer Engineering Department

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Gavin Lowe. Casper: A compiler for the analysis of security ...
  • C. Caleiroa, L. Viganò  , and D. Basin. On the semantics of Alice ...
  • S. D. Brookes, C. A. R. Hoare, and A. W. Roscoe. A theory of ...
  • R. Milner. A calculus of communicating systems. In Lecture Notes in ...
  • M. Abadi and A. D.Gordon. A calculus for cryptographic protocols: The spi ...
  • R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Reasoning About Knowledge. ...
  • D. Hughes and V. Shmatikov. Information hiding, anonymity and privacy: A modular ...
  • F. Dechesne and Y. Wang. To know or not to know: epistemic ...
  • A. Hommersom, J.-J. Meyer, and E.P. de Vink. Update semantics of security ...
  • A. Baltag and M. Sadrzadeh. The algebra of multi-agent dynamic belief revision. ...
  • Simon Kramer. Cryptographic protocol logic: Satisfaction for (timed) dolev-yao cryptography. ...
  • S. Richards and M. Sadrzadeh. Aximo: Automated axiomatic reasoning for information update. ...
  • Yanjing Wang. Epistemic Modeling and Protocol Dynamics. PhD thesis, University ...
  • R. Chadha, S. Delaune, and S. Kremer. Epistemic logic for the applied pi ...
  • S. Kramer, C. Palamidessi, R. Segala, A. Turrini, and C. Braun. A quantitative doxastic logic ...
  • R. Milner. A spatial-epistemic logic for reasoning about security protocols. In ...
  • H. R. Mahrooghi and M. R.Mousavi. Reconciling operational and epistemic approaches to ...
  • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In ...
  • L. Peeter and R. Corin. Sound computational interpretation of formal encryption with ...
  • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational ...
  • Tomohiro Hoshi. Epistemic Modeling and Protocol Information. PhD thesis, Stanford ...
  • M. Hennessy and R. Milner. Algebraic laws for nondeterminism and concurrency. Journal ...
  • F. Raimondi and A. Lomuscio. Automatic verification of deontic interpreted systems by ...
  • J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in ...
  • M. Abadi and C. Fournet. Mobile values, new names, and secure communication. ...
  • J. v. Eijck and S. Orzan. Epistemic verification of anonymity. In Proceedings VODCA'06, ...
  • P.J. Broadfoot. Data Independence in the Model Checking of Security ...
  • F. Dechesne, M. R. Mousavi, and S. Orzan. Operational and epistemic approaches to ...
  • G. D. Plotkin. A structural approach to operational semantics. Journal of ...
  • A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for ...
  • S. Delaune, S. Kremer, and M. Ryan. Verifying privacy-type properties of electronic voting ...
  • H. R. Mahrooghi, M. H. Haghighat, and R. Jalili. Formal verification of authentication-type ...
  • J. v. Eijck and S. Orzan. Epistemic verification of anonymity. Electronic Notes in ...
  • M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and C. Talcott. All About ...
  • A. Baskar, R. Ramanujam, and S. P. Suresh. Knowledge-based modelling of voting protocols. ...
  • نمایش کامل مراجع