Protection Against Hackers on Client Computers for e-Voting Systems
نویسنده
چکیده
Recently, Ivan Damgaard and Mads Jurik proposed a protocol for protecting Internet voters against hackers. The protocol ensures that hackers with full control of the computer of a voter will be unable to see what the voter votes. Further, if the hacker tampers with the vote and tricks the voter to vote for a different candidate, the vote will be for an arbitrary candidate (uniformly distributed on all candidates) rather than for the choice of the hacker. This solves a principal problem, which has been a showstopper for some voting projects. However, when this protocol is combined with secrecy of votes implemented using homomorphic encryption and secret sharing, the performance is not good enough to make a practical implementation of the protocol for elections with a non-trivial number of voters and candidates.
منابع مشابه
A Social Mechanism for Supporting Home Computer Security∗
Hackers have learned to leverage the enormous number of poorly protected home computers by turning them into a large distributed system (known as a botnet), making home computers an important frontier for security research. They present special problems: owners are unsophisticated, and usage profiles are varied making onesize-fits-all firewall policies ineffective. We propose a social firewall ...
متن کاملEVIV: An end-to-end verifiable Internet voting system
Traditionally, a country’s electoral system requires the voter to vote at a specific day and place, which conflicts with the mobility usually seen in modern live styles. Thus, the widespread of Internet (mobile) broadband access can be seen as an opportunity to deal with this mobility problem, i.e. the adoption of an Internet voting system can make the live of voter’s much more convenient; howe...
متن کاملProtecting clinical data on Web client computers: the PCASSO approach
The ubiquity and ease of use of the Web have made it an increasingly popular medium for communication of health-related information. Web interfaces to commercially available clinical information systems are now available or under development by most major vendors. To the extent that such interfaces involve the use of unprotected operating systems, they are vulnerable to security limitations of ...
متن کاملAn Intrusion-tolerant e-Voting Client System
The ambition of any e-voting system is to reproduce, in an electronic environment, the characteristics of physical voting systems, such as accuracy, democracy, privacy and veri ability. REVS is an Internet e-voting system based on blind signatures and designed to be robust in distributed and faulty environments. However, the execution of REVS client system, used by voters, can be tampered by in...
متن کاملDeCore: Detecting Content Repurposing Attacks on Clients' Systems
Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike. In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which specifically targets sites that host user uploaded content on Web 2.0 sites. This latent threat is poorly addressed, if at all, by cur...
متن کامل