TY - GEN
T1 - Machine-checked proofs for electronic voting
T2 - 31st IEEE Computer Security Foundations Symposium, CSF 2018
AU - Cortier, Veronique
AU - Dragan, Constantin Catalin
AU - Dupressoir, Francois
AU - Warinschi, Bogdan
PY - 2018/9
Y1 - 2018/9
N2 - We present a machine-checked security analysis of Belenios - a deployed voting protocol used already in more than 200 elections. Belenios extends Helios with an explicit registration authority to obtain eligibility guarantees. We offer two main results. First, we build upon a recent framework for proving ballot privacy in EasyCrypt. Inspired by our application to Belenios, we adapt and extend the privacy security notions to account for protocols that include a registration phase. Our analysis identifies a trust assumption which is missing in the existing (pen and paper) analysis of Belenios: Ballot privacy does not hold if the registrar misbehaves, even if the role of the registrar is seemingly to provide eligibility guarantees. Second, we develop a novel framework for proving strong verifiability in EasyCrypt and apply it to Belenios. In the process, we clarify several aspects of the pen-and-paper proof, such as how to deal with revote policies. Together, our results yield the first machine-checked analysis of both ballot privacy and verifiability properties for a deployed electronic voting protocol. Perhaps more importantly, we identify several issues regarding the applicability of existing definitions of privacy and verifiability to systems other than Helios. While we show how to adapt the definitions to the particular case of Belenios, our findings indicate the need for more general security notions for electronic voting protocols with registration authorities.
AB - We present a machine-checked security analysis of Belenios - a deployed voting protocol used already in more than 200 elections. Belenios extends Helios with an explicit registration authority to obtain eligibility guarantees. We offer two main results. First, we build upon a recent framework for proving ballot privacy in EasyCrypt. Inspired by our application to Belenios, we adapt and extend the privacy security notions to account for protocols that include a registration phase. Our analysis identifies a trust assumption which is missing in the existing (pen and paper) analysis of Belenios: Ballot privacy does not hold if the registrar misbehaves, even if the role of the registrar is seemingly to provide eligibility guarantees. Second, we develop a novel framework for proving strong verifiability in EasyCrypt and apply it to Belenios. In the process, we clarify several aspects of the pen-and-paper proof, such as how to deal with revote policies. Together, our results yield the first machine-checked analysis of both ballot privacy and verifiability properties for a deployed electronic voting protocol. Perhaps more importantly, we identify several issues regarding the applicability of existing definitions of privacy and verifiability to systems other than Helios. While we show how to adapt the definitions to the particular case of Belenios, our findings indicate the need for more general security notions for electronic voting protocols with registration authorities.
KW - Easycrypt
KW - electronic-voting
KW - machine-checked-proofs
KW - privacy
KW - verifiability
UR - http://www.scopus.com/inward/record.url?scp=85052124158&partnerID=8YFLogxK
U2 - 10.1109/CSF.2018.00029
DO - 10.1109/CSF.2018.00029
M3 - Conference Contribution (Conference Proceeding)
AN - SCOPUS:85052124158
SN - 9781538666814
SP - 298
EP - 312
BT - 2018 IEEE 31st Computer Security Foundations Symposium (CSF 2018)
PB - Institute of Electrical and Electronics Engineers (IEEE)
Y2 - 9 July 2018 through 12 July 2018
ER -