e-voting, security issue
#1

[attachment=8840]
e-voting, security issues
Postal voting vs. e-Voting

• What distinguishes e-voting from postal voting?
– the concept of an “original document” (i.e. ballot paper) is no longer given
– data traces shall not jeopardize anonymity
– various denial-of-service attack paths
• Aside these considerations, there is little reason to argue, that e-Voting is less secure than postal voting
– e.g. family voting is possible in both
Security requirements/solutions Paper- vs. electronic-world
Conventional e-Government

• Based on conventional technologies
– communication security
– unique identification
– el. signatures
e-Voting: Challenge vote secrecy
Various proposals

• Organizational measures
– Rely on / trust the election authorities
• Specific cryptographic protocols
– Blind signatures
• One phase: Fujioka/Okamota/Ohta
• Two phase: Prosser/Krimmer
– Secure Multiparty Communication
– Homomorphic cryptography
– Cryptographic mixes
• Specialized hardware
– cf. hardware security module
Typical voting channels
• Phone (Pilots in UK, NL, …)
– e.g. „long“ DTMF codes
• Cell phones
– dial-tone
– SMS / WAP
– Future: Build-in crypto
• e.g Telenor: mobile phones with cryptographic co-processor
• Initiatives such as WIM, S/WIM
• Computer
– Cryptography in software / hardware tokens
• e.g. Citizen cards
Council of Europe
• Integrated project on
 legal
 operational
 technical standards for e-enabled voting
• State of technical security standards
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: contemporary issue report of india, mba project report on current contemporary issue, security issue in mobile database ppt, www karmasangsthan vol 28 issue no 50 april 9, topics seminar on contemporary issue, ipr issue related to biomedical engg, issue management techniques ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,254 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Visual security is feeble for anti-phishing seminar surveyer 5 4,340 18-10-2012, 01:15 PM
Last Post: seminar details
  wireless internet security full report computer science technology 1 5,014 26-01-2012, 10:46 AM
Last Post: seminar addict
  Cryptography and Network Security seminar surveyer 5 4,588 08-08-2011, 09:59 AM
Last Post: seminar addict
  Security Technologies seminar class 0 2,614 18-03-2011, 12:20 PM
Last Post: seminar class
  DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL project report helper 0 1,961 08-10-2010, 11:18 AM
Last Post: project report helper
  Understanding Enterprise Security with Integration and Convergence computer science technology 0 1,241 24-01-2010, 03:23 PM
Last Post: computer science technology

Forum Jump: