Civitas Security Requirements
#1

Civitas Security Requirements

[attachment=15948]

Civitas

Features:
Designed for remote voting, coercion resistance, verifiability
Supports plurality, approval, Condorcet methods

Status:
Paper in Oakland 2008
Publicly available: 21,000 LOC (Jif, Java, and C)
Prototype

…Suitable for IACR?

Security Model

No trusted supervision of polling places
Including voters, procedures, hardware, software
Voting could take place anywhere

Remote voting

Generalization of “Internet voting” and “postal voting”

Interesting problem to solve!

Adversary

Always:
May perform any polynomial time computation
May corrupt all but one of each type of election authority
Distributed trust

Almost always:
May control network
May coerce voters, demanding secrets or behavior, remotely or physically


Security properties:
Confidentiality, integrity, availability

Confidentiality

Voter coercion:
Employer, spouse, etc.
Coercer can demand any behavior (vote buying)
Coercer can observe and interact with voter during remote voting

Must prevent coercers from trusting their own observations




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: oakland nj, oakland coliseum,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,153 31-01-2015, 11:55 PM
Last Post: Guest
  Android Mobile Security – An Issue of Future computer girl 2 2,394 24-08-2013, 10:26 AM
Last Post: computer topic
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,735 06-02-2013, 10:02 AM
Last Post: seminar details
Music CELL PHONE VIRUSES AND SECURITY Computer Science Clay 10 10,813 11-10-2012, 08:12 PM
Last Post: jerrysamon
  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM computer girl 1 1,602 06-10-2012, 01:26 PM
Last Post: seminar details
  Wireless LAN Security computer science crazy 1 2,726 24-02-2012, 12:21 PM
Last Post: seminar paper
  information security using steganography seminar class 1 1,684 13-02-2012, 02:48 PM
Last Post: seminar paper
  BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) computer science crazy 18 22,121 26-01-2012, 10:47 AM
Last Post: seminar addict
  GSM Mobile Security presentation project report maker 7 5,511 24-01-2012, 10:05 AM
Last Post: seminar addict
Thumbs Down GSM Security And Encryption Computer Science Clay 8 7,055 16-01-2012, 11:17 AM
Last Post: seminar addict

Forum Jump: