Abstract:One of the main open issues in electronic government is the fact that the individual users' multi-purpose computing platforms are used. In terms of security, no guarantee is given since these platforms are not under the government authority's control. Even worse, the number of malware infected computing platforms increases. This so-called Secure Platform Problem and approaches aiming to solve it are objects of investigation in this work. We define criteria that need to be ensured to address this problem. Furth… Show more
“…Recall that Rule (1) is the only rule producing fresh constants and thereby creating Fr facts. By Equation (23), every fresh constant is produced at most once in a trace. Fresh constants can be obtained (generated) by honest agents using Rule (2).…”
Section: B Extended Model Detailsmentioning
confidence: 99%
“…Most existing work focuses on particular scenarios, for instance on browserbased security protocols [12], [13], login procedures [14], solutions for online banking [27], or Internet voting [23]. A general approach to modeling and reasoning about such systems are security ceremonies [9].…”
Abstract-Establishing a secure communication channel between two parties is a nontrivial problem, especially when one or both are humans. Unlike computers, humans cannot perform strong cryptographic operations without supporting technology, yet this technology may itself be compromised. We introduce a general communication topology model to facilitate the analysis of security protocols in this setting. We use it to completely characterize all topologies that allow secure communication between a human and a remote server via a compromised computer. These topologies are relevant for a variety of applications, including online banking and Internet voting. Our characterization can serve to guide the design of novel solutions for applications and to quickly exclude proposals that cannot possibly offer secure communication.
“…Recall that Rule (1) is the only rule producing fresh constants and thereby creating Fr facts. By Equation (23), every fresh constant is produced at most once in a trace. Fresh constants can be obtained (generated) by honest agents using Rule (2).…”
Section: B Extended Model Detailsmentioning
confidence: 99%
“…Most existing work focuses on particular scenarios, for instance on browserbased security protocols [12], [13], login procedures [14], solutions for online banking [27], or Internet voting [23]. A general approach to modeling and reasoning about such systems are security ceremonies [9].…”
Abstract-Establishing a secure communication channel between two parties is a nontrivial problem, especially when one or both are humans. Unlike computers, humans cannot perform strong cryptographic operations without supporting technology, yet this technology may itself be compromised. We introduce a general communication topology model to facilitate the analysis of security protocols in this setting. We use it to completely characterize all topologies that allow secure communication between a human and a remote server via a compromised computer. These topologies are relevant for a variety of applications, including online banking and Internet voting. Our characterization can serve to guide the design of novel solutions for applications and to quickly exclude proposals that cannot possibly offer secure communication.
“…A message utilizing images, sound or video would be very effective but would have to be delivered via a supporting platform. Unfortunately there is always the possibility that the voting platform has been compromised [50], thus delivering instructional messages this way seems insecure 2 . Hence we designed messages which could easily be delivered via a secure channel (e.g.…”
Section: B Developing Behaviour-change Messagesmentioning
Abstract-There is increasing interest in verifiable Internet voting systems that enable voters to verify the integrity of their vote on the voting platform prior to casting it, and any interested party to verify the integrity of the election results. The ease with which a vote can be verified plays a key role. Empowering individual voters to act as interested yet objective verifiers increases the probability of fraud detection. Verifying constitutes additional effort, something humans resist unless the benefits are compelling enough. Thus, what is the best way to provide such motivation? We report on a survey, distributed to 123 respondents, in which we explore the effects of three types of motivating messages on voters' intention to verify a vote, using a smartphone app. The motivating messages were intended to increase the intention to verify a vote. Our findings have persuaded us that further research on the use of motivating messages in the context of verifiable voting is warranted.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.