TU Darmstadt / ULB / TUbiblio

Towards a Framework on the Security Requirements for Electronic Voting Protocols

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009)
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Atlanta, GA, USA
doi: 10.1109/RE-VOTE.2009.9
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2009
Autor(en): Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander
Art des Eintrags: Bibliographie
Titel: Towards a Framework on the Security Requirements for Electronic Voting Protocols
Sprache: Englisch
Publikationsjahr: August 2009
Buchtitel: First International Workshop on Requirements Engineering for E-Voting Systems
Reihe: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9
Veranstaltungsort: Atlanta, GA, USA
DOI: 10.1109/RE-VOTE.2009.9
Kurzbeschreibung (Abstract):

Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.

Freie Schlagworte: Security, Usability and Society;Secure Data
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Theoretische Informatik - Kryptographie und Computeralgebra
20 Fachbereich Informatik > SECUSO - Security, Usability and Society
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 30 Dez 2016 20:23
Letzte Änderung: 12 Jan 2019 21:21
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen