• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 7 (8), 2008
  3. 1133-1140
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2008 | Volume: 7 | Issue: 8 | Page No.: 1133-1140
DOI: 10.3923/itj.2008.1133.1140

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 264

Search


Authors


Bo Meng

Country: China

Keywords


  • formal method
  • Internet voting protocol
  • privacy
  • coercion-resistance
Research Article

Formal Analysis of Key Properties in the Internet Voting Protocol Using Applied Pi Calculus

Bo Meng
The internet voting protocols is the core part of the internet voting system. In order to put the internet voting protocols into practice they should have several key properties, such as privacy, completeness, soundness, unreusability, fairness, eligibility and invariableness, universal verifiability, receipt-freeness and coercion-resistance. Formal method is an important tool to assess these properties. But most of these properties are analyzed with informal method. The applied pi calculus can be used to model and verify the security protocols, such as internet voting protocol. In this study, firstly, privacy and coercion-resistance properties are researched. Then a typical internet voting protocol is modeled with applied pi calculus. Thirdly privacy and coercion-resistance of the typical internet voting protocol are analyzed with applied pi calculus. According to the result of analysis the typical internet voting protocol has privacy and coercion-resistance properties.
PDF Fulltext XML References Citation

How to cite this article

Bo Meng, 2008. Formal Analysis of Key Properties in the Internet Voting Protocol Using Applied Pi Calculus. Information Technology Journal, 7: 1133-1140.

DOI: 10.3923/itj.2008.1133.1140

URL: https://scialert.net/abstract/?doi=itj.2008.1133.1140

Related Articles

Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model
Formalizing Deniability
A Critical Review of Receipt-Freeness and Coercion-Resistance
Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model
Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved