How could Snowden attack an election?

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We discuss a new type of attack on voting systems that in contrast to attacks described in the literature does not disrupt the expected behavior of the voting system itself. Instead the attack abuses the normal functionality to link the tallying of the election to disclosing sensitive information assumed to be held by the adversary. Thus the attack forces election officials to choose between two undesirable options: Not to publish the election result or to play into the adversary’s hand and to publicize sensitive information. We stress that the attack is different from extortion and not restricted to electronic voting systems.

Cite

CITATION STYLE

APA

Wikström, D., Barrat, J., Heiberg, S., Krimmer, R., & Schürmann, C. (2017). How could Snowden attack an election? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10615 LNCS, pp. 280–291). Springer Verlag. https://doi.org/10.1007/978-3-319-68687-5_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free