Neumann et al., 2014 - Google Patents
Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?Neumann et al., 2014
View PDF- Document ID
- 17322860828780761033
- Author
- Neumann S
- Olembo M
- Renaud K
- Volkamer M
- Publication year
- Publication venue
- International Conference on Electronic Government and the Information Systems Perspective
External Links
Snippet
Helios is an end-to-end verifiable remote electronic voting system which has been used for elections in academic contexts. It allows voters to verify that their vote was cast, and included in the final tally, as intended. User studies have shown that voters are unlikely to perform this …
- 238000000034 method 0 abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C13/00—Voting apparatus
- G07C13/02—Ballot boxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Neumann et al. | Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both? | |
Heiberg et al. | Verifiable internet voting in Estonia | |
Karayumak et al. | Usability analysis of Helios—an open source verifiable remote electronic voting system | |
US20120102324A1 (en) | Remote verification of user presence and identity | |
Marky et al. | Improving the usability and ux of the swiss internet voting interface | |
Kulyk et al. | Comparing “challenge-based” and “code-based” internet voting verification implementations | |
Khelifi et al. | M-Vote: a reliable and highly secure mobile voting system | |
Puiggalí et al. | Verifiability experiences in government online voting systems | |
Zollinger et al. | “Just for the sake of transparency”: Exploring Voter Mental Models of Verifiability | |
Heinl et al. | Remote electronic voting in uncontrolled environments: A classifying survey | |
Giustolisi et al. | Remark!: A secure protocol for remote exams | |
Marky et al. | Investigating {State-of-the-Art} practices for fostering subjective trust in online voting through interviews | |
Pangan et al. | Authenticating data transfer using RSA-Generated QR Codes | |
Rura et al. | Online voting system based on image steganography and visual cryptography | |
Peter et al. | Development of mobile application for E-voting system using 3-step security for preventing phishing attack | |
Marcos del Blanco et al. | E-Voting System Evaluation Based on the Council of Europe Recommendations: n Votes | |
Sherine et al. | Development of an Efficient and Secured E‐Voting Mobile Application Using Android | |
Ansper et al. | Security and Trust for the Norwegian E-voting Pilot Project E-valg 2011 | |
Kulyk et al. | German voters’ attitudes towards voting online with a verifiable system | |
Juvonen | A framework for comparing the security of voting schemes | |
Stenbro | A survey of modern electronic voting technologies | |
Wilson | Modeling Requirements Conflicts in Secret Ballot Elections | |
Brunello et al. | E-Voting with Confidence: Usability Challenges in Manual Integrity Checks | |
Schläpfer et al. | The secure platform problem taxonomy and analysis of existing proposals to address this problem | |
Blanchard et al. | Phrase-verified voting: verifiable low-tech remote boardroom voting: how we voted on tenure & promotion cases during the pandemic |