TU Darmstadt / ULB / TUbiblio

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Book Section, Bibliographie

Abstract

Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter, security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques: secrecy, fairness, integrity, and verifiability. Furthermore, the chapter discusses their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluates security and cryptographic techniques with respect to the costs that come along with their real-world application. The authors conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.

Item Type: Book Section
Erschienen: 2014
Editors: Zissis, Dimitrios ; Lekkas, Dimitrios
Creators: Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Type of entry: Bibliographie
Title: Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Language: English
Date: 2014
Publisher: IGI Global
Series: Design, Development, and Use of Secure Electronic Voting Systems
Corresponding Links:
Abstract:

Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter, security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques: secrecy, fairness, integrity, and verifiability. Furthermore, the chapter discusses their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluates security and cryptographic techniques with respect to the costs that come along with their real-world application. The authors conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.

Uncontrolled Keywords: Security, Usability and Society;Secure Data
Identification Number: TUD-CS-2013-0015
Divisions: 20 Department of Computer Science > SECUSO - Security, Usability and Society
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
Profile Areas > Cybersecurity (CYSEC)
LOEWE > LOEWE-Zentren
20 Department of Computer Science
Profile Areas
LOEWE
Date Deposited: 28 Jul 2016 18:35
Last Modified: 30 May 2018 12:53
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details