TU Darmstadt / ULB / TUbiblio

Towards a Framework on the Security Requirements for Electronic Voting Protocols

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Abstract

Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.

Item Type: Conference or Workshop Item
Erschienen: 2009
Creators: Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander
Title: Towards a Framework on the Security Requirements for Electronic Voting Protocols
Language: ["languages_typename_1" not defined]
Abstract:

Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who participated in the election. This paper provides definitions of different levels of election secrecy and verifiability. We also investigate whether there exists an order for the different levels and provide adversary models. The resulting compilation is useful since it may not be necessary, or even possible, to achieve the maximum level for all the security requirements in parallel. Thus, appropriate levels of the requirements can be selected for different types of elections, e.g. parliamentary elections vs. elections in associations.

Title of Book: First International Workshop on Requirements Engineering for E-Voting Systems
Series Name: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9
ISBN: 978-0-7695-4100-6
Uncontrolled Keywords: Security, Usability and Society;Secure Data
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
20 Department of Computer Science > SECUSO - Security, Usability and Society
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Event Location: Atlanta, GA, USA
Date Deposited: 30 Dec 2016 20:23
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8
Identification Number: LLASJBMV20099
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item