Bisimulations for verifying strategic abilities with an application to the ThreeBallot voting protocol.
Francesco BelardinelliRodica ConduracheCatalin DimaWojciech JamrogaMichal KnapikPublished in: Inf. Comput. (2021)
Keyphrases
- voting protocols
- lightweight
- electronic voting
- case study
- communication protocol
- cryptographic protocols
- decision making
- model checking
- authentication protocol
- network protocols
- voting method
- application layer
- security protocols
- knowledge management
- multi party
- human beings
- coloured petri nets
- social networks
- security analysis
- tcp ip
- provably secure
- blind signature
- social media
- database systems