[go: up one dir, main page]

Neumann et al., 2014 - Google Patents

Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?

Neumann et al., 2014

View PDF
Document ID
17322860828780761033
Author
Neumann S
Olembo M
Renaud K
Volkamer M
Publication year
Publication venue
International Conference on Electronic Government and the Information Systems Perspective

External Links

Snippet

Helios is an end-to-end verifiable remote electronic voting system which has been used for elections in academic contexts. It allows voters to verify that their vote was cast, and included in the final tally, as intended. User studies have shown that voters are unlikely to perform this …
Continue reading at pureportal.strath.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C13/00Voting apparatus
    • G07C13/02Ballot boxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Similar Documents

Publication Publication Date Title
Neumann et al. Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?
Heiberg et al. Verifiable internet voting in Estonia
Karayumak et al. Usability analysis of Helios—an open source verifiable remote electronic voting system
US20120102324A1 (en) Remote verification of user presence and identity
Marky et al. Improving the usability and ux of the swiss internet voting interface
Kulyk et al. Comparing “challenge-based” and “code-based” internet voting verification implementations
Khelifi et al. M-Vote: a reliable and highly secure mobile voting system
Puiggalí et al. Verifiability experiences in government online voting systems
Zollinger et al. “Just for the sake of transparency”: Exploring Voter Mental Models of Verifiability
Heinl et al. Remote electronic voting in uncontrolled environments: A classifying survey
Giustolisi et al. Remark!: A secure protocol for remote exams
Marky et al. Investigating {State-of-the-Art} practices for fostering subjective trust in online voting through interviews
Pangan et al. Authenticating data transfer using RSA-Generated QR Codes
Rura et al. Online voting system based on image steganography and visual cryptography
Peter et al. Development of mobile application for E-voting system using 3-step security for preventing phishing attack
Marcos del Blanco et al. E-Voting System Evaluation Based on the Council of Europe Recommendations: n Votes
Sherine et al. Development of an Efficient and Secured E‐Voting Mobile Application Using Android
Ansper et al. Security and Trust for the Norwegian E-voting Pilot Project E-valg 2011
Kulyk et al. German voters’ attitudes towards voting online with a verifiable system
Juvonen A framework for comparing the security of voting schemes
Stenbro A survey of modern electronic voting technologies
Wilson Modeling Requirements Conflicts in Secret Ballot Elections
Brunello et al. E-Voting with Confidence: Usability Challenges in Manual Integrity Checks
Schläpfer et al. The secure platform problem taxonomy and analysis of existing proposals to address this problem
Blanchard et al. Phrase-verified voting: verifiable low-tech remote boardroom voting: how we voted on tenure & promotion cases during the pandemic