Practical Everlasting Privacy - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2013

Practical Everlasting Privacy

Résumé

Will my vote remain secret in 20 years? This is a natural question in the context of electronic voting, where encrypted votes may be published on a bulletin board for verifiability purposes, but the strength of the encryption is eroded with the passage of time. The question has been addressed through a property referred to as everlasting privacy. Perfect everlasting privacy may be difficult or even impossible to achieve, in particular in remote electronic elections. In this paper, we propose a definition of practical everlasting privacy. The key idea is that in the future, an attacker will be more powerful in terms of computation (he may be able to break the cryptography) but less powerful in terms of the data he can operate on (transactions between a vote client and the vote server may not have been stored).\par We formalize our definition of everlasting privacy in the applied-pi calculus. We provide the means to characterize what an attacker can break in the future in several cases. In particular, we model this for perfectly hiding and computationally binding primitives (or the converse), such as Pedersen commitments, and for symmetric and asymmetric encryption primitives. We adapt existing tools, in order to allow us to automatically prove everlasting privacy. As an illustration, we show that several variants of Helios (including Helios with Pedersen commitments) and a protocol by Moran and Naor achieve practical everlasting privacy, using the ProVerif and the AKiSs tools.
Fichier principal
Vignette du fichier
ACKR-post13.pdf (343.35 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00878630 , version 1 (07-10-2015)

Identifiants

Citer

Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark D. Ryan. Practical Everlasting Privacy. 2nd Conferences on Principles of Security and Trust (POST'13), Mar 2013, Rome, Italy. pp.21-40, ⟨10.1007/978-3-642-36830-1_2⟩. ⟨hal-00878630⟩
372 Consultations
102 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More