Vote Verification using CAPTCHA-like Primitives
نویسندگان
چکیده
Recently proposed voter-verifiable protocols provide encrypted paper receipts to voters, who may later check that these receipts are in the electronic ballot box. This paper describes an enhancement that allows the voter to electronically transmit, from the polling booth, her encrypted receipt to an external verifier, who may perform the check on her behalf. It uses a CAPTCHA-like primitive – whose security depends on the hardness of an AI problem – as a humanly-recognizable digital signature, to enable the voter to be certain that the receipt has been securely deposited with the external verifier. This approach presents several advantages: the voter is not required to do anything outside the polling booth, no receipts are needed after polling, and all receipts generated by the polling machine can be checked. Additionally, an audio-based format is an easy extension for those with visual disabilities, and it is anticipated that a public already familiar with CAPTCHAs will find the approach easy to use.
منابع مشابه
Impeding CAPTCHA Breakers with Visual Decryption
Abuse of free Internet resources and services from false account creation, to spam, to identity theft, excessive bandwidth usage, or even vote stuffing online polls is a big problem. The Completely Automatic Public Turing Test to tell Computers and Humans Apart (CAPTCHA) controls access to resources but automated systems are increasingly adept at overcoming them. In this paper a method of acces...
متن کاملTowards New Security Primitives Based on Hard AI Problems
Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems.
متن کاملType-Based Verification of Electronic Voting Protocols
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorous analysis quite challenging. As a matter of fact, existing automated analysis techniques, which are mostly based on automated theorem provers, are inadequate to deal with commonly used cryptographic...
متن کاملGraphical Password Using Captcha for More Secure Authentication Scheme
388 ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET Abstract: A new security primitive for new graphical authentication scheme based on hard artificial intelligence problems. Number of graphical password scheme has been proposed as options to traditional to text password authentication, namely a new family of graphical password system for Captcha technology with the level of security. We...
متن کامل