e-voting, security issue
#1

[attachment=8840]
e-voting, security issues
Postal voting vs. e-Voting

• What distinguishes e-voting from postal voting?
– the concept of an “original document” (i.e. ballot paper) is no longer given
– data traces shall not jeopardize anonymity
– various denial-of-service attack paths
• Aside these considerations, there is little reason to argue, that e-Voting is less secure than postal voting
– e.g. family voting is possible in both
Security requirements/solutions Paper- vs. electronic-world
Conventional e-Government

• Based on conventional technologies
– communication security
– unique identification
– el. signatures
e-Voting: Challenge vote secrecy
Various proposals

• Organizational measures
– Rely on / trust the election authorities
• Specific cryptographic protocols
– Blind signatures
• One phase: Fujioka/Okamota/Ohta
• Two phase: Prosser/Krimmer
– Secure Multiparty Communication
– Homomorphic cryptography
– Cryptographic mixes
• Specialized hardware
– cf. hardware security module
Typical voting channels
• Phone (Pilots in UK, NL, …)
– e.g. „long“ DTMF codes
• Cell phones
– dial-tone
– SMS / WAP
– Future: Build-in crypto
• e.g Telenor: mobile phones with cryptographic co-processor
• Initiatives such as WIM, S/WIM
• Computer
– Cryptography in software / hardware tokens
• e.g. Citizen cards
Council of Europe
• Integrated project on
 legal
 operational
 technical standards for e-enabled voting
• State of technical security standards
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: android mobile security an issue of future, seminar report for information security issue of cloud computing, power quality issue, critical issue using, e r diagram on issue tracking system project, generic issue of code generator, synopsis format security issue on cloud computing ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,371 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Visual security is feeble for anti-phishing seminar surveyer 5 4,353 18-10-2012, 01:15 PM
Last Post: seminar details
  wireless internet security full report computer science technology 1 5,024 26-01-2012, 10:46 AM
Last Post: seminar addict
  Cryptography and Network Security seminar surveyer 5 4,603 08-08-2011, 09:59 AM
Last Post: seminar addict
  Security Technologies seminar class 0 2,624 18-03-2011, 12:20 PM
Last Post: seminar class
  DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALL project report helper 0 1,973 08-10-2010, 11:18 AM
Last Post: project report helper
  Understanding Enterprise Security with Integration and Convergence computer science technology 0 1,251 24-01-2010, 03:23 PM
Last Post: computer science technology

Forum Jump: