Evaluating Security of Voting Schemes in the Universal Composability Framework
#1

Abstract

In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do As a solution to this, we suggest evaluating voting schemes in the universal com- posability framework. We investigate the popular class of voting schemes based on homomorphic threshold encryption. It turns out that schemes in this class realize an ideal voting functionality that takes the votes as input and outputs the result. This ideal functionality corresponds closely to the well-known ballot box model used today in man- ual voting. Security properties such as privacy, accuracy and robustness now follow as easy corollaries. We note that some security requirements, for instance incoercibility, Security holds in the random oracle model against a non-adaptive adversary. We show with a concrete example that the schemes are not secure against adaptive adver- saries. We proceed to sketch how to make them secure against adaptive adversaries in the erasure model with virtually no loss of eciency. We also sketch how to achieve security against adaptive adversaries in the erasure-free model.


Presented By:
Jens Groth


read full report and ppt
http://brics.dk/~jg/VotingSecurityFull.pdf
http://brics.dk/~jg/ACNSVotingSecurity.ppt
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: development schemes of typical microprocessor, schemes offered to wholesalers, evaluating security of websites, security and relay schemes ppt seminar, evaluating the vulnerability of network traffic using joint security and routing analysis ppt, rhyme schemes, relay schemes,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Validation Framework for the Service-Oriented Process Designing 1 955 15-02-2017, 03:58 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 844 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 924 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,409 16-03-2015, 02:52 PM
Last Post: seminar report asees
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,595 10-01-2015, 11:13 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,281 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,718 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,682 29-07-2013, 11:09 AM
Last Post: computer topic
  A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video electronics seminars 4 3,062 23-03-2013, 07:40 PM
Last Post: [email protected]

Forum Jump: