Author:
Kazm Asad Raza,Kanwal Maryam,Fakhir Muhammad Ilyas,Qasim Awais,Ishaq Atif
Abstract
Security protocols form the backbone of our modern digital society. Voting is one of the most important activities in modern democratic world. Recently proposed Star-vote voting system claims to satisfy some crucial electronic voting protocol properties. In this work, we analyze properties of Star-vote electronic voting system. We are interested in privacy, fairness and eligibility properties. Intuitively, an electronic voting protocol ensures privacy if the link between voter and his vote remains secret. Fairness property holds if no partial election results can be obtained which can influence the remaining voters. Eligibility property holds if only registered voters can vote. We used proverif to prove these properties hold. To our knowledge we are conducting first automated analysis of privacy, fairness and eligibility properties of Star-vote voting system in presence of authorities behave as intruder. Ultimately, this work will help to avoid the current situation whereby many electronic voting protocols are purposed and deployed, and does not satisfy basic security property and found to be insecure.
Reference17 articles.
1. S. Wolchok et al., “Security analysis of India’s electronic voting machines,” in Proceedings of the 17th ACM conference on Computer and communications security, 2010.
2. Sudharsan, R. Tharun, N. Krishna M P, B. Raj, S. Arvindh M, and D. M. Alagappan, “Secured electronic voting system using the concepts of blockchain,” in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2019.
3. S. Delaune, S. Kremer, and M. Ryan, “Verifying privacy-type properties of electronic voting protocols: A taster,” in Towards Trustworthy Elections, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 289–309.
4. M. Chaieb, M. Koscina, S. Yousfi, P. Lafourcade, and R. Robbana, “DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain,” in Theoretical Aspects of Computing – ICTAC 2019, Cham: Springer International Publishing, 2019, pp. 292–312.
5. B. Blanchet, M. Abadi, and C. Fournet, “Automated verification of selected equivalences for security protocols,” J. Log. Algebr. Program., vol. 75, no. 1, pp. 3–51, 2008.