Kleptographic attacks on e-voting schemes

被引:0
作者
Gogolewski, Marcin [1 ]
Klonowski, Marek
Kubiak, Przemyslaw
Kutylowski, Miroslaw
Lauks, Anna
Zagorski, Filip
机构
[1] Adam Mickiewicz Univ Poznan, Fac Math & Comp Sci, PL-61712 Poznan, Poland
[2] Wroclaw Tech Univ, Inst Math & Comp Sci, PL-50370 Wroclaw, Poland
来源
EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS | 2006年 / 3995卷
关键词
kleptography; electronic voting; receipt voting; coercion; election integrity; verifiable pseudo-randomness;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze electronic voting schemes and show that in many cases it is quite easy to implement a kleptographic channel, which is a profound danger for electronic voting systems. We show serious problems with Neff's scheme. We present also attacks on Chaum's visual voting scheme and some related schemes, which work at least when implementation is not careful enough.
引用
收藏
页码:494 / 508
页数:15
相关论文
共 21 条
[1]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[2]  
Chaum D, 2005, LECT NOTES COMPUT SC, V3679, P118
[3]   Secret-ballot receipts: True voter-verifiable elections [J].
Chaum, D .
IEEE SECURITY & PRIVACY, 2004, 2 (01) :38-47
[4]  
DAVIDA G, 1982, TRCS822 U WISC DEP E
[5]  
Haber S., 1991, J CRYPTOL, V3, P99, DOI [10.1007/BF00196791, DOI 10.1007/BF00196791]
[6]  
Karlof C, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P33
[7]  
Klonowski M, 2005, LECT NOTES COMPUT SC, V3650, P490
[8]  
Knuth D. E., 2014, Seminumerical algorithms, V2
[9]  
Koldehofe Boris, 2004, STUD INFORM U, V3, P43
[10]   A better ballot box? [J].
Mercuri, R .
IEEE SPECTRUM, 2002, 39 (10) :46-+