Bernhard et al., 2017 - Google Patents
Public evidence from secret ballotsBernhard et al., 2017
View PDF- Document ID
- 10452177128373964891
- Author
- Bernhard M
- Benaloh J
- Alex Halderman J
- Rivest R
- Ryan P
- Stark P
- Teague V
- Vora P
- Wallach D
- Publication year
- Publication venue
- Electronic Voting: Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings 2
External Links
Snippet
Elections seem simple—aren't they just about counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and …
- 238000004458 analytical method 0 abstract description 2
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C13/00—Voting apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bernhard et al. | Public evidence from secret ballots | |
Ryan et al. | Prêt à voter: a voter-verifiable voting system | |
Willemson | Bits or paper: which should get to carry your vote? | |
Gebhardt Stenerud et al. | When reality comes knocking norwegian experiences with verifiable electronic voting | |
Volkamer et al. | Measures to establish trust in internet voting | |
Demirel et al. | Prêt à voter providing everlasting privacy | |
Ottoboni et al. | Election integrity and electronic voting machines in 2018 Georgia, USA | |
Malhotra et al. | Untangling e-voting platform for secure and enhanced voting using blockchain technology | |
Awad et al. | The evolution of voting: analysis of conventional and electronic voting systems | |
Cetinkaya et al. | Towards secure e-elections in turkey: requirements and principles | |
Rura et al. | Online voting verification with cryptography and steganography approaches | |
Prosser | Transparency in evoting: lessons learnt | |
Juvonen | A framework for comparing the security of voting schemes | |
Juma et al. | Election results' verification in e-voting systems in Kenya: a review | |
Morales-Rocha et al. | New voter verification scheme using pre-encrypted ballots | |
Nandi et al. | Stamp-it: a method for enhancing the universal verifiability of e2e voting systems | |
Abeels et al. | Postal Voting | |
Krishnamoorthy et al. | A Robust Blockchain Assisted Electronic Voting Mechanism with Enhanced Cyber Norms and Precautions | |
Post | Using re-voting to reduce the threat of coercion in elections | |
Vejačka | Evaluation of internet voting systems based on requirements satisfaction | |
Lee et al. | A practical and secure electronic election system | |
Wu | Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation | |
Emeksiz | Securing Democratic Elections to Protect E-Voting System via Cryptography in the United States | |
Ryan | Securing the Foundations of Democracy | |
Pereira | Check for Individual Verifiability and Revoting in the Estonian Internet Voting System Olivier Pereira () ICTEAM, Crypto Group, UCLouvain, 1348 Louvain-la-Neuve, Belgium |