Analysis of security requirements for cryptographic voting protocols (extended abstract)

被引:0
|
作者
Cetinkaya, Orhan [1 ]
机构
[1] METU, Inst Appl Math, Ankara, Turkey
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election and it is not an easy task due to the need of achieving electronic voting security requirements. The cryptographic voting protocols use advanced cryptography to make electronic voting secure and applicable. In this paper, formal definitions of security requirements for cryptographic voting protocols (privacy, eligibility, uniqueness, fairness, uncoercibility, receipt-freeness, accuracy, and individual verifiability) are provided, and elaborate checklists for each requirement are presented The voting problem is clearly defined in terms of security requirements. The voting problem arises from the trade-off between receipt-freeness and individual verifiability. This paper suggests the Predefined Fake Vote (PreFote) scheme as an applicable solution to overcome the voting problem. The PreFote scheme is not a voting protocol; however, it is a building block that can be used by any voting protocol.
引用
收藏
页码:1451 / 1456
页数:6
相关论文
共 50 条
  • [1] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [2] Cryptographic protocols for electronic voting
    Wagner, David
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 393 - 393
  • [3] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [4] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [5] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [6] Cryptographic voting protocols: A systems perspective
    Karlof, C
    Sastry, N
    Wagner, D
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 33 - 49
  • [7] A comparative overview of cryptographic voting protocols
    Nurmi, H
    Salomaa, A
    [J]. ANNALS OF OPERATIONS RESEARCH, 1998, 84 (0) : 29 - 43
  • [8] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    Popova, Elena
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [9] Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
    Kulyk, Oksana
    Neumann, Stephan
    Budurushi, Jurlind
    Volkamer, Melanie
    Haenni, Rolf
    Koenig, Reto
    von Bergen, Philemon
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 224 - 229
  • [10] On security models and compilers for group key exchange protocols (Extended abstract)
    Bresson, Emmanuel
    Manulis, Mark
    Schwenk, Joerg
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +