{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:41:19Z","timestamp":1774946479913,"version":"3.50.1"},"reference-count":0,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2009,7,2]],"date-time":"2009-07-02T00:00:00Z","timestamp":1246492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2009,7,2]]},"abstract":"<jats:p> Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. We study three privacy-type properties of electronic voting protocols: in increasing order of strength, they are vote-privacy, receipt-freeness and coercion-resistance. <\/jats:p><jats:p> We use the applied pi calculus, a formalism well adapted to modelling such protocols, which has the advantages of being based on well-understood concepts. The privacy-type properties are expressed using observational equivalence and we show in accordance with intuition that coercion-resistance implies receipt-freeness, which implies vote-privacy. <\/jats:p><jats:p> We illustrate our definitions on three electronic voting protocols from the literature. Ideally, these three properties should hold even if the election officials are corrupt. However, protocols that were designed to satisfy receipt-freeness or coercion-resistance may not do so in the presence of corrupt officials. Our model and definitions allow us to specify and easily change which authorities are supposed to be trustworthy. <\/jats:p>","DOI":"10.3233\/jcs-2009-0340","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T07:38:29Z","timestamp":1463557109000},"page":"435-487","source":"Crossref","is-referenced-by-count":169,"title":["Verifying privacy-type properties of electronic voting protocols"],"prefix":"10.1177","volume":"17","author":[{"given":"St\u00e9phanie","family":"Delaune","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Birmingham, Birmingham, UK"},{"name":"LSV, CNRS & ENS Cachan & INRIA Futurs projet SECSI, Cachan, France"}]},{"given":"Steve","family":"Kremer","sequence":"additional","affiliation":[{"name":"LSV, CNRS & ENS Cachan & INRIA Futurs projet SECSI, Cachan, France"}]},{"given":"Mark","family":"Ryan","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Birmingham, Birmingham, UK"}]}],"member":"179","published-online":{"date-parts":[[2009,7,2]]},"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2009-0340","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2009-0340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T15:22:48Z","timestamp":1741620168000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-2009-0340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,2]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,7,2]]}},"alternative-id":["10.3233\/JCS-2009-0340"],"URL":"https:\/\/doi.org\/10.3233\/jcs-2009-0340","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,2]]}}}