Formal Modeling and Verifying Privacy Types Properties of Security
Protocols
This webpage is used to give more details on the SeVe
tool, an automatic tool used to specify and verify privacy type security
protocols.
The tool can be downloaded from here.
The technical report can be downloaded from here.
The explanation of SeVe language as well as it¡¯s syntax can be download from here.
The operational semantics and LTS model semantic of system, as well as
formal definition of three types of privacy properties are described here.
All specifications of the case studies are available here.
We use our tool to automatically specify and verify three electronic
voting protocols in literature:
¡¤
Protocol of Fujioka et al. [1]
¡¤
Protocol of Okamoto et al. [2]
¡¤
Protocol of Lee et al. [3]
This page is
maintained by Luu Anh Tuan. Please
contact us if you have any question about this webpage or these experiments. We
will reply your enquiries as soon as possible.
As stated in the paper, the motivation of this tool is to create an automatic tool for specifying and verifying security protocols related with privacy type properties.
These protocols were demonstrated in [4]. However in that paper, the
reasoning task is mainly carried out by hand. We prove that we can verify these
protocols in an automatic way: the user only needs to specify the protocol in SeVe language; the reasoning will automatically run and
return the verification result. This make the proving process is more reliable
and avoiding errors. Moreover, by using automatic ways, we can verify larger
system, which is crucial in practical use.
Protocol |
Property |
#States |
#Transition |
Time(s) |
Result |
Fujioka et al. |
Simple privacy |
356 |
360 |
0.117s |
true |
Receipt freeness |
138 |
141 |
0.053s |
false |
|
Coercion resistance |
97 |
104 |
0.040s |
false |
|
Okamoto et al. |
Simple privacy |
484 |
492 |
0.133s |
true |
Receipt freeness |
606 |
611 |
0.158s |
true |
|
Coercion resistance |
131 |
136 |
0.068s |
false |
|
Lee et al. |
Simple privacy |
1744 |
1810 |
0.715s |
true |
Receipt freeness |
2107 |
2265 |
0.849s |
true |
|
Coercion resistance |
2594 |
2673 |
0.930s |
true |
1.
T. O. Atsushi Fujioka and
K. Ohta. A Practical Secret Voting Scheme for Large
Scale Elections. In Advances in
Cryptology AUSCRYPT 92, volume 718, pages 244¨C251, 1992.
2.
T. Okamoto. An Electronic
Voting Scheme. In Proceedings of IFIP
World Conference on IT Tools, pages 21¨C30, 1996.
3.
B. Lee, C.
Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo.
Providing Receipt-Freeness in Mixnet-based Voting Protocols.
In Information Security and Cryptology
(ICISC03), volume 2971, pages 245¨C258, 2004.
4.
S. Delaune, S. Kremer, and M.
Ryan. Verifying privacy-type properties of electronic voting protocols. In Journal of Computer Security, volume 17,
pages 435¨C487, 2009.