Registration protocol security analysis of the electronic voting system based on blinded intermediaries using the Avispa tool
Electronic voting systems are a future alternative to traditional methods of voting. It is important to verify the main algorithms on which system security is based. This paper analyzes the security of the cryptographic protocol at the registration stage, which is used in the electronic voting syste...
Main Authors: | I. A. Pisarev, L. K. Babenko |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/561 |
Similar Items
-
Cryptographic Stack Machine Notation One
by: S. E. Prokopev
Published: (2018-10-01) -
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
by: Nadezhda S. Mogilevskaya
Published: (2012-03-01) -
C# parser for extracting cryptographic protocols structure from source code
by: Ilya Aleksandrovich Pisarev, et al.
Published: (2019-09-01) -
Corporate Governance Development with E-voting Services
by: B. S. Bataeva
Published: (2020-07-01) -
Algorithms of the protected information exchange in radio channels of a space navigation system
by: S. V. Shtanko, et al.
Published: (2015-10-01)