Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2970030.2970039acmotherconferencesArticle/Chapter ViewAbstractPublication PagespraiseConference Proceedingsconference-collections
research-article

Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt

Published: 29 August 2016 Publication History

Abstract

Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strategic aspect of information security in voting procedures. We argue that the notions of receipt-freeness and coercion resistance are underpinned by existence (or nonexistence) of a suitable strategy for some participants of the voting process. In order to back the argument formally, we provide logical "transcriptions" of the informal intuitions behind coercion-related properties that can be found in the existing literature. The transcriptions are formulated in the modal game logic ATL*, well known in the area of multi-agent systems.

References

[1]
R. Aditya, B. Lee, C. Boyd, and E. Dawson. An efficient mixnet-based voting scheme providing receipt-freeness. In Trust and Privacy in Digital Business, pages 152--161. Springer, 2004.
[2]
T. Ågotnes. Action and knowledge in alternating-time temporal logic. Synthese, 149(2):377--409, 2006. Section on Knowledge, Rationality and Action.
[3]
R. Alur, T. A. Henzinger, and O. Kupferman. Alternating-time Temporal Logic. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS), pages 100--109. IEEE Computer Society Press, 1997.
[4]
R. Alur, T. A. Henzinger, and O. Kupferman. Alternating-time Temporal Logic. Journal of the ACM, 49:672--713, 2002.
[5]
R. Araújo, N. B. Rajeb, R. Robbana, J. Traoré, and S. Youssfi. Towards practical and secure coercion-resistant electronic elections. In Cryptology and Network Security, pages 278--297. Springer, 2010.
[6]
M. Backes, C. Hritcu, and M. Maffei. Automated verification of remote electronic voting protocols in the applied pi-calculus. In Computer Security Foundations Symposium, 2008. CSF'08. IEEE 21st, pages 195--209. IEEE, 2008.
[7]
A. Baskar, R. Ramanujam, and S. Suresh. Knowledge-based modelling of voting protocols. In Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge, pages 62--71. ACM, 2007.
[8]
N. Belnap and M. Perloff. Seeing to it that: a canonical form for agentives. Theoria, 54:175--199, 1988.
[9]
J. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pages 544--553. ACM, 1994.
[10]
I. Boureanu, M. Cohen, and A. Lomuscio. Automatic verification of temporal-epistemic properties of cryptographic protocols. Journal of Applied Non-Classical Logics, 19(4):463--487, 2009.
[11]
I. Boureanu, M. Cohen, and A. Lomuscio. Model checking detectability of attacks in multiagent systems. In Proceedings of AAMAS, pages 691--698, 2010.
[12]
I. Boureanu, A. V. Jones, and A. Lomuscio. Automatic verification of epistemic specifications under convergent equational theories. In Proceedings of AAMAS, pages 1141--1148, 2012.
[13]
I. Boureanu, P. Kouvaros, and A. Lomuscio. Verifying security properties in unbounded multiagent systems. In Proceedings of AAMAS, pages 1209--1217, 2016.
[14]
J. W. Bryans, M. Koutny, L. Mazaré, and P. Y. Ryan. Opacity generalised to transition systems. In Formal Aspects in Security and Trust, pages 81--95. Springer, 2005.
[15]
J. W. Bryans, M. Koutny, and P. Y. Ryan. Modelling opacity using petri nets. Electronic Notes in Theoretical Computer Science, 121:101--115, 2005.
[16]
R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multiparty contract signing. Journal of Automated Reasoning, 36(1-2):39--83, 2006.
[17]
K. Chatterjee, T. A. Henzinger, and N. Piterman. Strategy logic. In Proceedings of CONCUR, pages 59--73, 2007.
[18]
D. Chaum, P. Y. A. Ryan, and S. A. Schneider. A practical voter-verifiable election scheme. In Proceedings of ESORICS, pages 118--139, 2005.
[19]
S. Delaune, S. Kremer, and M. Ryan. Coercion-resistance and receipt-freeness in electronic voting. In Computer Security Foundations Workshop, 2006. 19th IEEE, pages 12--pp. IEEE, 2006.
[20]
S. Delaune, S. Kremer, and M. Ryan. Verifying privacy-type properties of electronic voting protocols: A taster. In Towards Trustworthy Elections, pages 289--309. Springer, 2010.
[21]
S. Delaune, S. Kremer, and M. D. Ryan. Receipt-freeness: Formal definition and fault attacks. In Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy. Citeseer, 2005.
[22]
J. Dreier, P. Lafourcade, and Y. Lakhnech. A formal taxonomy of privacy in voting protocols. In Communications (ICC), 2012 IEEE International Conference on, pages 6710--6715. IEEE, 2012.
[23]
E. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, pages 995--1072. Elsevier Science Publishers, 1990.
[24]
A. Herzig and N. Troquard. Knowing how to play: Uniform choices in logics of agency. In Proceedings of AAMAS'06, pages 209--216, 2006.
[25]
W. Jamroga and T. Ågotnes. Constructive knowledge: What agents can achieve under incomplete information. Journal of Applied Non-Classical Logics, 17(4):423--475, 2007.
[26]
W. Jamroga, S. Mauw, and M. Melissen. Fairness in non-repudiation protocols. In Proceedings of STM'11, volume 7170 of Lecture Notes in Computer Science, pages 122--139, 2012.
[27]
W. Jamroga and W. van der Hoek. Agents that know how to play. Fundamenta Informaticae, 63(2-3):185--219, 2004.
[28]
H. L. Jonker and W. Pieters. Receipt-freeness as a special case of anonymity in epistemic logic. 2006.
[29]
A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant electronic elections. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 61--70. ACM, 2005.
[30]
S. Kremer and J. Raskin. Game analysis of abuse-free contract signing. In Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02), pages 206--220. IEEE Computer Society Press, 2002.
[31]
S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security, 11(3), 2003.
[32]
W.-C. Ku and C.-M. Ho. An e-voting scheme against bribe and coercion. In e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004 IEEE International Conference on, pages 113--116. IEEE, 2004.
[33]
R. Kusters and T. Truderung. An epistemic approach to coercion-resistance for electronic voting protocols. In Security and Privacy, 2009 30th IEEE Symposium on, pages 251--266. IEEE, 2009.
[34]
R. Küsters, T. Truderung, and A. Vogt. A game-based definition of coercion-resistance and its applications. In 2010 23rd IEEE Computer Security Foundations Symposium, pages 122--136. IEEE, 2010.
[35]
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Providing receipt-freeness in mixnet-based voting protocols. In Information Security and Cryptology-ICISC 2003, pages 245--258. Springer, 2004.
[36]
B. Lee and K. Kim. Receipt-free electronic voting scheme with a tamper-resistant randomizer. In Information Security and Cryptology-ICISC 2002, pages 389--406. Springer, 2003.
[37]
A. Lomuscio and W. Penczek. LDYIS: a framework for model checking security protocols. Fundamenta Informaticae, 85(1-4):359--375, 2008.
[38]
E. Magkos, M. Burmester, and V. Chrissikopoulos. Receipt-freeness in large-scale elections without untappable channels. In Towards The E-Society, pages 683--693. Springer, 2001.
[39]
B. Meng. A critical review of receipt-freeness and coercion-resistance. Information Technology Journal, 8(7):934--964, 2009.
[40]
M. Michels and P. Horster. Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In Advances in Cryptology-ASIACRYPT'96, pages 125--132. Springer, 1996.
[41]
F. Mogavero, A. Murano, G. Perelli, and M. Vardi. What makes ATL* decidable? a decidable fragment of strategy logic. In Proceedings of CONCUR, pages 193--208, 2012.
[42]
F. Mogavero, A. Murano, G. Perelli, and M. Vardi. Reasoning about strategies: On the model-checking problem. ACM Transactions on Computational Logic, 15(4):1--42, 2014.
[43]
F. Mogavero, A. Murano, and M. Vardi. Reasoning about strategies. In Proceedings of FSTTCS, pages 133--144, 2010.
[44]
T. Moran and M. Naor. Receipt-free universally-verifiable voting with everlasting privacy. In Advances in Cryptology-CRYPTO 2006, pages 373--392. Springer, 2006.
[45]
T. Okamoto. Receipt-free electronic voting schemes for large scale elections. In Security Protocols, pages 25--35. Springer, 1998.
[46]
T. Peacock and P. Ryan. Coercion-resistance as opacity in voting systems. Technical Report Series-University Of Newcatle Upon Tyne Computing Science, 959, 2006.
[47]
P. Y. A. Ryan. The computer ate my vote. In Formal Methods: State of the Art and New Directions, pages 147--184. Springer, 2010.
[48]
M. Schlapfer, R. Haenni, R. Koenig, and O. Spycher. Efficient vote authorization in coercion-resistant internet voting. In E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers, volume 7187, page 71. Springer, 2012.
[49]
H. Schnoor. Strategic planning for probabilistic games with incomplete information. In Proceedings of AAMAS'10, pages 1057--1064, 2010.
[50]
P. Y. Schobbens. Alternating-time logic with imperfect recall. Electronic Notes in Theoretical Computer Science, 85(2):82--93, 2004.
[51]
S. G. Weber, R. Araujo, and J. Buchmann. On coercion-resistant electronic elections with linear work. In Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on, pages 908--916. IEEE, 2007.

Cited By

View all
  • (2024)SMT4SMTL: A Tool for SMT-Based Satisfiability Checking of SMTLProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663297(2815-2817)Online publication date: 6-May-2024
  • (2023)Playing to Learn, or to Keep Secret: Alternating-Time Logic Meets Information TheoryProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598710(766-774)Online publication date: 30-May-2023
  • (2022)A Formal Approach to Coercion Resistance and Its Application to E-VotingMathematics10.3390/math1005078110:5(781)Online publication date: 28-Feb-2022
  • Show More Cited By
  1. Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and Security
      August 2016
      91 pages
      ISBN:9781450343046
      DOI:10.1145/2970030
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 August 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. coercion resistance
      2. receipt freeness

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      PrAISe '16

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 28 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)SMT4SMTL: A Tool for SMT-Based Satisfiability Checking of SMTLProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663297(2815-2817)Online publication date: 6-May-2024
      • (2023)Playing to Learn, or to Keep Secret: Alternating-Time Logic Meets Information TheoryProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598710(766-774)Online publication date: 30-May-2023
      • (2022)A Formal Approach to Coercion Resistance and Its Application to E-VotingMathematics10.3390/math1005078110:5(781)Online publication date: 28-Feb-2022
      • (2022)How to measure usable securityJournal of Computer Security10.3233/JCS-21004930:3(381-409)Online publication date: 1-Jan-2022
      • (2022)STV+AGR: Towards Verification of Strategic Ability Using Assume-Guarantee ReasoningPRIMA 2022: Principles and Practice of Multi-Agent Systems10.1007/978-3-031-21203-1_47(691-696)Online publication date: 12-Nov-2022
      • (2021)STV+Reductions: Towards Practical Verification of Strategic Ability Using Model ReductionsProceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3463952.3464232(1770-1772)Online publication date: 3-May-2021
      • (2021)Natural Strategic Abilities in Voting ProtocolsSocio-Technical Aspects in Security and Trust10.1007/978-3-030-79318-0_3(45-62)Online publication date: 22-Jun-2021
      • (2020)Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting ProtocolInformation and Computation10.1016/j.ic.2020.104552(104552)Online publication date: Mar-2020
      • (2019)Strategy logic with simple goalsProceedings of the 28th International Joint Conference on Artificial Intelligence10.5555/3367032.3367046(88-94)Online publication date: 10-Aug-2019
      • (2019)STVProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332116(2372-2374)Online publication date: 8-May-2019
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media