Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009)
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Atlanta, GA, USA
doi: 10.1109/RE-VOTE.2009.9
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2009 |
Autor(en): | Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander |
Art des Eintrags: | Bibliographie |
Titel: | Towards a Framework on the Security Requirements for Electronic Voting Protocols |
Sprache: | Englisch |
Publikationsjahr: | August 2009 |
Buchtitel: | First International Workshop on Requirements Engineering for E-Voting Systems |
Reihe: | IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9 |
Veranstaltungsort: | Atlanta, GA, USA |
DOI: | 10.1109/RE-VOTE.2009.9 |
Kurzbeschreibung (Abstract): | Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations. |
Freie Schlagworte: | Security, Usability and Society;Secure Data |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Theoretische Informatik - Kryptographie und Computeralgebra 20 Fachbereich Informatik > SECUSO - Security, Usability and Society LOEWE LOEWE > LOEWE-Zentren LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt |
Hinterlegungsdatum: | 30 Dez 2016 20:23 |
Letzte Änderung: | 12 Jan 2019 21:21 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |