A formal analysis of the Norwegian E-voting protocol
A formal analysis of the Norwegian E-voting protocol. Véronique Cortier and Cyrille Wiedling. Journal of Computer Security, 25(15777):21–57, 2017.
Download
Abstract
Norway used e-voting in its last political election both in September 2011 and September 2013, with more than 28,000 voters using the e-voting option in 2011, and 70,000 in 2013. While some other countries use a black-box, proprietary voting solution, Norway has made its system publicly available. The underlying protocol, designed by Scytl, involves several authorities (a ballot box, a receipt generator, a decryption service, and an auditor). Of course, trusting the correctness and security of e-voting protocols is crucial in that context. In this paper, we propose a formal analysis of the protocol used in Norway, w.r.t. ballot secrecy, considering several corruption scenarios. We use a state-of-the-art definition of ballot secrecy, based on equivalence properties and stated in the applied pi-calculus.
BibTeX
@Article{JCS2016,
author = {V\'eronique Cortier and Cyrille Wiedling},
title = {A formal analysis of the Norwegian E-voting protocol},
journal = {Journal of Computer Security},
year = {2017},
OPTkey = {},
volume = {25},
number = {15777},
pages = {21--57},
OPTmonth = {},
OPTannote = {},
abstract = {Norway used e-voting in its last political election both in September
2011 and September 2013, with more than 28,000 voters using the
e-voting option in 2011, and 70,000 in 2013. While some other
countries use a black-box, proprietary voting solution, Norway has
made its system publicly available. The underlying protocol, designed by Scytl, involves several authorities (a ballot box, a receipt generator, a decryption service, and an auditor). Of course, trusting the correctness and security of e-voting protocols is crucial in that context. In this paper, we propose a formal analysis of the protocol used in Norway, w.r.t. ballot secrecy, considering several corruption scenarios. We use a state-of-the-art definition of ballot secrecy, based on equivalence properties and stated in the applied pi-calculus.
},
doi ={10.3233/JCS-15777},
}