首页> 外文OA文献 >Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols
【2h】

Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

机译:使用无条件的方式使代码投票安全抵御内部威胁   安全的mIX方案和人类psmT协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Code voting was introduced by Chaum as a solution for using a possiblyinfected-by-malware device to cast a vote in an electronic voting application.Chaum's work on code voting assumed voting codes are physically delivered tovoters using the mail system, implicitly requiring to trust the mail system.This is not necessarily a valid assumption to make - especially if the mailsystem cannot be trusted. When conspiring with the recipient of the castballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and"secure" communication over the Internet cannot fully be trusted. Thisemphasizes the importance of using: (1) Unconditional security for securenetwork communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption incode voting. We use PSMT protocols (SCN 2012) where with the help of visualaids, humans can carry out $\mod 10$ addition correctly with a 99\% degree ofaccuracy. We introduce an unconditionally secure MIX based on the combinatoricsof set systems. Given that end users of our proposed voting scheme construction are humans we\emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving:\begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure againsta $t$-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade thethreat of malware. \end{enumerate} We do not focus on active adversaries.
机译:Chaum引入了代码投票,作为一种解决方案,该解决方案使用可能被恶意软件感染的设备在电子投票应用程序中进行投票.Chaum在代码投票方面的工作假设投票代码是使用邮件系统实际交付给投票人的,隐含地需要信任投票者。邮件系统。这不一定是一个有效的假设,尤其是在无法信任邮件系统的情况下。当与选票的接收者合谋时,隐私受到破坏。公众很清楚,在隐私方面,不能完全信任计算机和Internet上的“安全”通信。这强调了使用以下方法的重要性:(1)安全网络通信的无条件安全性。 (2)减少对不受信任的计算机的依赖。在本文中,我们探讨了如何删除代码投票中的邮件系统信任假设。我们使用PSMT协议(SCN 2012),其中借助视觉辅助,人类可以以99%的准确度正确执行$ \ mod 10 $加法。我们介绍了一种基于集合系统组合的无条件安全的MIX。鉴于我们提议的投票方案构建的最终用户是人类,因此我们无法使用经典的安全多方计算协议。我们的解决方案适用于实现单座和多座选举:\ begin {enumerate} [i)] \ item匿名且完全安全的通信网络,可防止用于传递投票的$ t $约束的被动对手的安全,\ item最终步骤协议可以由人来规避恶意软件的威胁。 \ end {enumerate}我们不关注活跃的对手。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号