Making code voting secure against insider threats using unconditionally secure MIX schemes and human PSMT protocols

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is clear to the public that when it comes to privacy, computers and “secure” communication over the Internet cannot fully be trusted. Chaum introduced code voting as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. He trusted the mail system. However, a conspiracy between the mail system and the recipient of the cast ballots breaks privacy. Considering a t-bounded passive adversary, we remove the trust in the mail. We propose both single and multi-seat elections, using PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod10 addition correctly with a 99% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems.

Cite

CITATION STYLE

APA

Desmedt, Y., & Erotokritou, S. (2015). Making code voting secure against insider threats using unconditionally secure MIX schemes and human PSMT protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9269, pp. 110–126). Springer Verlag. https://doi.org/10.1007/978-3-319-22270-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free