e-voting, security issue
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#1
19-02-2011, 02:24 PM



.ppt   344_a_08__e_voting_security___leitold.ppt (Size: 481 KB / Downloads: 113)
e-voting, security issues
Postal voting vs. e-Voting

• What distinguishes e-voting from postal voting?
– the concept of an “original document” (i.e. ballot paper) is no longer given
– data traces shall not jeopardize anonymity
– various denial-of-service attack paths
• Aside these considerations, there is little reason to argue, that e-Voting is less secure than postal voting
– e.g. family voting is possible in both
Security requirements/solutions Paper- vs. electronic-world
Conventional e-Government

• Based on conventional technologies
– communication security
– unique identification
– el. signatures
e-Voting: Challenge vote secrecy
Various proposals

• Organizational measures
– Rely on / trust the election authorities
• Specific cryptographic protocols
– Blind signatures
• One phase: Fujioka/Okamota/Ohta
• Two phase: Prosser/Krimmer
– Secure Multiparty Communication
– Homomorphic cryptography
– Cryptographic mixes
• Specialized hardware
– cf. hardware security module
Typical voting channels
• Phone (Pilots in UK, NL, …)
– e.g. „long“ DTMF codes
• Cell phones
– dial-tone
– SMS / WAP
– Future: Build-in crypto
• e.g Telenor: mobile phones with cryptographic co-processor
• Initiatives such as WIM, S/WIM
• Computer
– Cryptography in software / hardware tokens
• e.g. Citizen cards
Council of Europe
• Integrated project and implimentation on
 legal
 operational
 technical standards for e-enabled voting
• State of technical security standards
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Biometric Security Palm Vein Technology project uploader 2 1,458 19-08-2013, 09:55 AM
Last Post: study tips
  INFORMATION SECURITY USING STEGANOGRAPHY ppt seminar tips 0 864 07-02-2013, 04:20 PM
Last Post: seminar tips
  CYBER CRIME AND SECURITY REPORT project girl 1 834 02-02-2013, 11:45 AM
Last Post: seminar tips
  OPERATING SYSTEM SECURITY project uploader 4 3,188 19-12-2012, 01:02 PM
Last Post: seminar tips
  CYBERCRIME & NETWORK SECURITY seminar flower 1 1,569 05-10-2012, 11:44 AM
Last Post: seminar tips
  CYBER AND SECURITY ppt seminar flower 0 584 24-09-2012, 03:55 PM
Last Post: seminar flower
  SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES seminar flower 0 519 24-09-2012, 01:26 PM
Last Post: seminar flower
  cryptography and network security full report computer science technology 18 20,985 03-08-2012, 11:31 AM
Last Post: seminar ideas
  Ensuring Data Storage Security in Cloud Computing project uploader 1 1,045 13-06-2012, 11:22 AM
Last Post: seminar ideas
  MESSAGE SECURITY seminar flower 0 544 01-06-2012, 01:12 PM
Last Post: seminar flower