@incollection{GrahlScheben2016, author = {Daniel Grahl and Christoph Scheben}, title = {Functional Verification and Information Flow Analysis of an Electronic Voting System}, booktitle = {Deductive Software Verification - The {\KeY} Book: From Theory to Practice}, year = {2016}, publisher = {Springer}, pages = {593--607}, chapter = {18}, part = {V: Case Studies}, doi = {10.1007/978-3-319-49812-6_18}, series = {Lecture Notes in Computer Science}, volume = {10001}, month = dec, abstract = {Electronic voting (e-voting) systems that are used in public elections need to fulfill a broad range of strong requirements concerning both safety and security. Among those requirements are reliability, robustness, privacy of votes, coercion resistance, and universal verifiability. Bugs in or manipulations of an e-voting system can have considerable influence on society. Therefore, e-voting systems are an obvious target for software verification. This case study proves the preservation of privacy of votes for a basic electronic voting system. Altogether the considered code comprises eight classes and thirteen methods in about 150 lines of code of a rich fragment of Java.} }
Functional Verification and Information Flow Analysis of an Electronic Voting System
Author(s): | Daniel Grahl and Christoph Scheben |
---|---|
In: | Deductive Software Verification - The KeY Book: From Theory to Practice |
Publisher: | Springer |
Series: | Lecture Notes in Computer Science |
Volume: | 10001 |
Part: | V: Case Studies |
Chapter: | 18 |
Year: | 2016 |
Pages: | 593-607 |
DOI: | 10.1007/978-3-319-49812-6_18 |
Abstract
Electronic voting (e-voting) systems that are used in public elections need to fulfill a broad range of strong requirements concerning both safety and security. Among those requirements are reliability, robustness, privacy of votes, coercion resistance, and universal verifiability. Bugs in or manipulations of an e-voting system can have considerable influence on society. Therefore, e-voting systems are an obvious target for software verification. This case study proves the preservation of privacy of votes for a basic electronic voting system. Altogether the considered code comprises eight classes and thirteen methods in about 150 lines of code of a rich fragment of Java.