TU Darmstadt / ULB / TUbiblio

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Hrsg.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Buchkapitel, Bibliographie

Kurzbeschreibung (Abstract)

Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter, security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques: secrecy, fairness, integrity, and verifiability. Furthermore, the chapter discusses their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluates security and cryptographic techniques with respect to the costs that come along with their real-world application. The authors conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.

Typ des Eintrags: Buchkapitel
Erschienen: 2014
Herausgeber: Zissis, Dimitrios ; Lekkas, Dimitrios
Autor(en): Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Art des Eintrags: Bibliographie
Titel: Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Sprache: Englisch
Publikationsjahr: 2014
Verlag: IGI Global
Reihe: Design, Development, and Use of Secure Electronic Voting Systems
Zugehörige Links:
Kurzbeschreibung (Abstract):

Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter, security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques: secrecy, fairness, integrity, and verifiability. Furthermore, the chapter discusses their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluates security and cryptographic techniques with respect to the costs that come along with their real-world application. The authors conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.

Freie Schlagworte: Security, Usability and Society;Secure Data
ID-Nummer: TUD-CS-2013-0015
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik > SECUSO - Security, Usability and Society
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Fachbereich Informatik > Theoretische Informatik - Kryptographie und Computeralgebra
Profilbereiche > Cybersicherheit (CYSEC)
LOEWE > LOEWE-Zentren
20 Fachbereich Informatik
Profilbereiche
LOEWE
Hinterlegungsdatum: 28 Jul 2016 18:35
Letzte Änderung: 30 Mai 2018 12:53
PPN:
Zugehörige Links:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen