首页> 外文会议>Computer security - ESORICS 2010 >On E-Vote Integrity in the Case of Malicious Voter Computers
【24h】

On E-Vote Integrity in the Case of Malicious Voter Computers

机译:恶意选民计算机中的电子投票完整性

获取原文
获取原文并翻译 | 示例

摘要

Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was identified as a serious threat to e-voting. In this paper, we study the vote integrity of e-voting when the voter computers cannot be trusted. First, we make a number of assumptions about the available infrastructure. In particular, we assume the existence of two out-of-band channels that do not depend on the voter computers. The first channel is used to transmit integrity check codes to the voters prior the election, and the second channel is used to transmit a check code, that corresponds to her vote, back to a voter just after his or her e-vote vast cast. For this we also introduce a new cryptographic protocol. We present the new protocol with enough details to facilitate an implementation, and also present the timings of an actual implementation.
机译:挪威已在未来几年内开始实施电子投票(通过Internet并使用选民自己的计算机)。选民计算机的漏洞被认为是对电子投票的严重威胁。在本文中,我们研究了无法信任选民计算机时电子投票的投票完整性。首先,我们对可用的基础结构进行一些假设。特别是,我们假设存在两个不依赖投票计算机的带外通道。第一个通道用于在选举前向选民发送完整性检查码,第二个通道用于在进行电子投票后立即向选民发送与她的投票相对应的检查码。为此,我们还介绍了一种新的加密协议。我们为新协议提供了足够的细节以方便实施,并且还介绍了实际实施的时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号