Formal verification of tamper-evident storage tor e-voting

Dominique Cansell, J. Paul Gibson, Dominique Méry

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The storage of votes is a critical component of any voting system. In traditional systems there is a high level of transparency in the mechanisms used to store votes, and thus a reasonable degree of trustworthiness in the security of the votes in storage. This degree of transparency is much more difficult to attain in electronic voting systems, and so the specific mechanisms put in place to ensure the security of stored votes require much stronger verification in order for them to be trusted by the public. There are many desirable properties that one could reasonably expect a vote store to exhibit. From the point of view of security, we argue that tamper-evident storage is one of the most important requirements: the changing, or deletion of already validated and stored votes should be detectable; as should the addition of unauthorised votes after the election is concluded. We propose the application of formal methods (in this paper, event-B) for guaranteeing, through construction, the correctness of a vote store with respect to the requirement for tamperevident storage. We illustrate the utility of our refinementbased approach by verifying - through the application of a reusable formal design pattern - a store design that uses a specific PROM technology and applies a specific encoding mechanism.

Original languageEnglish
Title of host publicationProceedings - 5th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2007
Pages329-338
Number of pages10
DOIs
Publication statusPublished - 1 Dec 2007
Externally publishedYes
Event5th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2007 - London, United Kingdom
Duration: 10 Sept 200714 Sept 2007

Publication series

NameProceedings - 5th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2007

Conference

Conference5th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2007
Country/TerritoryUnited Kingdom
CityLondon
Period10/09/0714/09/07

Fingerprint

Dive into the research topics of 'Formal verification of tamper-evident storage tor e-voting'. Together they form a unique fingerprint.

Cite this