Security matters : privacy in voting and fairness in digital exchange

نویسندگان

  • Hugo Lennaert Jonker
  • Hugo JONKER
چکیده

actions, 130ACP, 57agent, 57semantics, 60state, 59anonymous receive, 61anonymous send, 61applied π, 52authorities, 10 ballot, 10blind signatures, 19, 73 cast, 10choice function, 54, 63choice group, 67choice indistinguishability, 67coercion-resistance, 52compliant device, 123conditional choice, 57, 62content, 105Counter, 10, 84 deadlock, 57derivability, 56designated verifier, see proofsdevice revocation list, 144Digital Rights Management, see DRMDolev-Yao, 54DRL, see device revocation listDRM, 105concept, 108DVP, see proofs election, 10epistemic logic, 51events, 57phase, 57receive, 57send, 57 fairness, 126, 137forced abstention, 52frameworkextensions, 72function fv, 57fv function, 58 guarded recursion, 57, 62 homomorphic encryption, 18, 73 incentivescontent creator, 108distributor, 109user, 109initial state, 63intruder model, 54, 134 knowledge, 56knowledge sharing, 67

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Analysis of Secure Electronic Voting System

-In this technological and knowledge age, e-commerce related matters become popular. Electronic voting is one of these matters and it is able to provide convenient, less expensive, fast and secure facilities. Important basic properties of electronic voting are fairness, privacy, eligibility, receiptfreeness, coercion-resistance and verifiability. Current electronic voting systems satisfy only s...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Analysis of Receipt-freeness in the Internet Voting Protocol with Applied Pi Calculus

The practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, and invariableness, universal verifiability, receipt-freeness, and coercion-resistance. Privacy describes the fact that a particular vote in a particular way is not revealed to anyone. Receipt-freeness means that the voter can not produce a receipt to prove that he votes ...

متن کامل

Electronic Voting Protocols Based on Blind Signatures

In this paper, we review the electronic voting protocols based on blind signature scheme. These protocols try to fulfil the following electronic voting requirements: eligibility, privacy, receipt-freeness, fairness, accuracy, individual verifiability and universal verifiability. Some of them like eligibility and privacy are easily achieved by the nature of blind signatures; on the other hand, s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009