2010
DOI: 10.1007/978-3-642-12980-3_19
|View full text |Cite
|
Sign up to set email alerts
|

Improving Remote Voting Security with CodeVoting

Abstract: Abstract. One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…In this case, any form of security devised for the overall online voting system, finally, will be defeated by the user's PC . Accordingly, some solutions have been proposed for better security in online voting : In the first approach that is unique to electronic voting (not practical for Internet voting); voters are required to cast the ballet from a private voting booth.In the second approach , a combination of public key cryptography, smart cards, and financial transactional IC card reader (FINREAD) terminal readers are employed with the purpose of implementing a trusted computing environment within the voter's insecure system. According to financial transactional IC card reader framework, security is ensured through three components: a secure display, a secure pin pad, and a card reader authentication function .…”
Section: The Internet Voting Leading Challenge: Client‐side Insecure mentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, any form of security devised for the overall online voting system, finally, will be defeated by the user's PC . Accordingly, some solutions have been proposed for better security in online voting : In the first approach that is unique to electronic voting (not practical for Internet voting); voters are required to cast the ballet from a private voting booth.In the second approach , a combination of public key cryptography, smart cards, and financial transactional IC card reader (FINREAD) terminal readers are employed with the purpose of implementing a trusted computing environment within the voter's insecure system. According to financial transactional IC card reader framework, security is ensured through three components: a secure display, a secure pin pad, and a card reader authentication function .…”
Section: The Internet Voting Leading Challenge: Client‐side Insecure mentioning
confidence: 99%
“…The greatest challenge for securing the entire voting protocol (process) is the insecurity of client‐side PCs that may be infected with many types of programs and malicious codes (or botnet network) . In many of the existing protocols, there is a false assumption that client systems are secure .…”
Section: Our Proposed Internet Voting Schemementioning
confidence: 99%
“…[JRF10,HS07,HRT10]. The central idea has also been further explored for online voting systems, such as Pretty Good Democracy (PGD [HRT10]).…”
Section: Code Voting and Pretty Good Democracymentioning
confidence: 99%
“…In the code sheets, candidates are assigned to random, unique codes, thus voters cast codes rather than candidates. Code voting has been extended in [16], [19], [17], [18], [20], [13], [14], [15] and [26]. The schemes in [6], [16], and [19] assume the voter to be honest in order to ensure secrecy.…”
Section: Related Workmentioning
confidence: 99%
“…The schemes in [6], [16], and [19] assume the voter to be honest in order to ensure secrecy. Other extensions of code voting, [17], [18], [20] assume a trustworthy voting-and voterspecific smart card for secrecy and integrity. All these schemes do not satisfy our security model, because one entity (either voter or smart card) can violate secrecy or integrity.…”
Section: Related Workmentioning
confidence: 99%