Cryptographic Voting Protocols
نویسندگان
چکیده
Acknowledgements I would like to thank some people who were involved in the creation of this thesis: • Berry Schoenmakers of TU Eindhoven for introducing me to the topic of cryptographic voting protocols. • Evangelos Karatsiolis for his work in guiding me through the process of writing this thesis and his constant motivation. • Roberto Samarone Araujo for hours of discussing various protocols with Evengelos and me. • Warren D. Smith for providing with a preliminary version of his up-coming book »How Mathematics can Improve Democracy«. • Ute Günther and Christian Burgmann for their proofreading. Nonetheless , any remaing errors shall be blamed on me. • Andrea Peter for her love and for cheering me up when I was down. • Last but not least my parents, Jacqueline Herrnkind and Hans Peter Klink – without their love and continuous support, this thesis would never have been written.
منابع مشابه
Cryptographic Voting Protocols: A Systems Perspective
Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and we must analyze their security by considering the system in its entirety. In this paper, we analy...
متن کاملType-Based Verification of Electronic Voting Protocols
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorous analysis quite challenging. As a matter of fact, existing automated analysis techniques, which are mostly based on automated theorem provers, are inadequate to deal with commonly used cryptographic...
متن کاملSecure Electronic Voting Protocols
This chapter gives a summary of cryptographic e-voting protocols. We start with a motivation and an overview of some aspects of traditional elections. We then outline the security requirements of e-voting and present in detail two approaches to cryptographic e-voting, based on homomorphic encryption and mix networks. We finish the chapter with a list of open problems.
متن کاملCryptographic Protocols for Electronic Voting
Electronic voting has seen a surge of growth in the US over the past five years; yet many questions have been raised about the trustworthiness of today’s e-voting systems. One solution that has been proposed involves use of sophisticated cryptographic protocols to prove to voters that their vote has been recorded and counted correctly. These protocols are of interest both for their use of many ...
متن کاملVotinbox - a voting system based on smart cards
The complexity of voting procedures, and their variations from country to country, make it challenging to design a secure electronic voting system. In most of the usual proposals, the security of the system relies mainly on a blackbox voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphi...
متن کاملCryptographic Concepts for Online-Feedback in Teleteaching Applications
Synchronous teleteaching solutions based on videoconferencing systems suffer a lack of communication channels compared to a face-to-face situation. Social protocols to increase awareness, speaker feedback, and the organization of distributed groups are not automatically available in a remote situation. In this paper we present the collaborative services voting and online-feedback that have been...
متن کامل