e-voting, security issue
#1

[attachment=8840]
e-voting, security issues
Postal voting vs. e-Voting

• What distinguishes e-voting from postal voting?
– the concept of an “original document” (i.e. ballot paper) is no longer given
– data traces shall not jeopardize anonymity
– various denial-of-service attack paths
• Aside these considerations, there is little reason to argue, that e-Voting is less secure than postal voting
– e.g. family voting is possible in both
Security requirements/solutions Paper- vs. electronic-world
Conventional e-Government

• Based on conventional technologies
– communication security
– unique identification
– el. signatures
e-Voting: Challenge vote secrecy
Various proposals

• Organizational measures
– Rely on / trust the election authorities
• Specific cryptographic protocols
– Blind signatures
• One phase: Fujioka/Okamota/Ohta
• Two phase: Prosser/Krimmer
– Secure Multiparty Communication
– Homomorphic cryptography
– Cryptographic mixes
• Specialized hardware
– cf. hardware security module
Typical voting channels
• Phone (Pilots in UK, NL, …)
– e.g. „long“ DTMF codes
• Cell phones
– dial-tone
– SMS / WAP
– Future: Build-in crypto
• e.g Telenor: mobile phones with cryptographic co-processor
• Initiatives such as WIM, S/WIM
• Computer
– Cryptography in software / hardware tokens
• e.g. Citizen cards
Council of Europe
• Integrated project on
 legal
 operational
 technical standards for e-enabled voting
• State of technical security standards
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: free download marathi audio speech of balkamgar issue, sbbj chak book issue, simple class diagram for issue tracking system, ipr issue related to biomedical engg, power quality issue in hybrid power system, hindi me s b i cheque book issue application hindi me, online checkbook issue of sbbj,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,253 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Visual security is feeble for anti-phishing seminar surveyer 5 4,339 18-10-2012, 01:15 PM
Last Post: seminar details
  wireless internet security full report computer science technology 1 5,013 26-01-2012, 10:46 AM
Last Post: seminar addict
  Cryptography and Network Security seminar surveyer 5 4,587 08-08-2011, 09:59 AM
Last Post: seminar addict
  Security Technologies seminar class 0 2,613 18-03-2011, 12:20 PM
Last Post: seminar class
  DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL project report helper 0 1,961 08-10-2010, 11:18 AM
Last Post: project report helper
  Understanding Enterprise Security with Integration and Convergence computer science technology 0 1,241 24-01-2010, 03:23 PM
Last Post: computer science technology

Forum Jump: