HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Private votes on untrusted platforms: models, attacks and provable scheme

Sergiu Bursuc 1 Constantin-Catalin Dragan 2 Steve Kremer 1
1 PESTO - Proof techniques for security protocols
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Modern e-voting systems deploy cryptographic protocols on a complex infrastructure involving different computing platforms and agents. It is crucial to have appropriate specification and evaluation methods to perform rigorous analysis of such systems, taking into account the corruption and computational capabilities of a potential attacker. In particular, the platform used for voting may be corrupted, e.g. infected by malware, and we need to ensure privacy and integrity of votes even in that case. We propose a new definition of vote privacy, formalized as a computational indistinguishability game, that allows to take into account such refined attacker models; we show that the definition captures both known and novel attacks against several voting schemes; and we propose a scheme that is provably secure in this setting. We moreover formalize and machine-check the proof in the EasyCrypt theorem prover.
Document type :
Conference papers
Complete list of metadata

Cited literature [55 references]  Display  Hide  Download

Contributor : Steve Kremer Connect in order to contact the contributor
Submitted on : Monday, April 15, 2019 - 8:51:56 AM
Last modification on : Friday, March 11, 2022 - 3:08:09 PM


Files produced by the author(s)


  • HAL Id : hal-02099434, version 1



Sergiu Bursuc, Constantin-Catalin Dragan, Steve Kremer. Private votes on untrusted platforms: models, attacks and provable scheme. EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. ⟨hal-02099434⟩



Record views


Files downloads