Evaluating Security of Voting Schemes in the Universal Composability Framework
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
02-04-2010, 10:55 AM


Abstract

In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do As a solution to this, we suggest evaluating voting schemes in the universal com- posability framework. We investigate the popular class of voting schemes based on homomorphic threshold encryption. It turns out that schemes in this class realize an ideal voting functionality that takes the votes as input and outputs the result. This ideal functionality corresponds closely to the well-known ballot box model used today in man- ual voting. Security properties such as privacy, accuracy and robustness now follow as easy corollaries. We note that some security requirements, for instance incoercibility, Security holds in the random oracle model against a non-adaptive adversary. We show with a concrete example that the schemes are not secure against adaptive adver- saries. We proceed to sketch how to make them secure against adaptive adversaries in the erasure model with virtually no loss of eciency. We also sketch how to achieve security against adaptive adversaries in the erasure-free model.


Presented By:
Jens Groth


read full report and ppt
brics.dk/~jg/VotingSecurityFull.pdf
brics.dk/~jg/ACNSVotingSecurity.ppt
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 815 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,027 21-10-2015, 01:52 PM
Last Post: Guest
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,769 09-12-2014, 09:25 PM
Last Post: Guest
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,531 10-06-2014, 11:39 AM
Last Post: java projects
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,057 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Web based java compiler online with security access Report seminar projects maker 0 546 27-09-2013, 02:14 PM
Last Post: seminar projects maker
  Routing Security in Ad Hoc Wireless Networks seminar projects maker 0 565 26-09-2013, 02:20 PM
Last Post: seminar projects maker
  Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks seminar projects maker 0 356 26-09-2013, 02:08 PM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography Report seminar projects maker 0 576 19-09-2013, 03:18 PM
Last Post: seminar projects maker
  Energy-Sustainable Framework and Performance Analysis of Power Scheme pdf seminar projects maker 0 258 12-09-2013, 02:51 PM
Last Post: seminar projects maker