Home // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies // View article


Ceremony Analysis Meets Verifiable Voting: Individual Verifiability in Helios

Authors:
Taciane Martimiano
Eduardo dos Santos
Maina Olembo
Jean Everson Martina
Ricardo Alexandre Reinaldo de Moraes

Keywords: Voting; Threat models; Security Ceremonies

Abstract:
The Helios verifiable voting system offers voters an opportunity to verify the integrity of their individual vote, that it is cast, and included in the final count, as intended. While not all voters have to verify, these steps can be cumbersome for those who aim to carry them out. Therefore, new verification processes have been proposed in order to improve usability. Voters can use a web-based verifier provided by any one of several independent verification institutes, or a smartphone app developed and provided by these institutes. In this work, we describe these verification processes as ceremonies, and thus model the human peer's interaction. We undertake a security analysis applying an adaptive threat model suited to analysing human-device and human-human channels. More realistic threats on these channels are identified, compared to those from an analysis using a Dolev-Yao attacker.

Pages: 105 to 111

Copyright: Copyright (c) IARIA, 2015

Publication date: August 23, 2015

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-427-5

Location: Venice, Italy

Dates: from August 23, 2015 to August 28, 2015