Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A coercion-resistant Internet voting protocol
Meng B.  ICSNC 2007 (Proc. of the 2nd International Conference on Systems and Networks Communications, Aug 25-31, 2007) 672007. Type: Proceedings
Date Reviewed: Apr 24 2008

An Internet voting protocol (IVP) is defined as a voting procedure that uses a computer to cast a ballot over the Internet. There are four types of Internet voting: remote IVP, kiosk IVP, polling places IVP, and precinct IVP. This paper is dedicated mainly to the first type.

A practical IVP should have two classes of properties: basic properties (privacy, completeness, soundness, nonreusability, fairness, eligibility, and invariableness), and expanded properties (universal verifiability, receipt-free, and coercion resistant).

The first section, after a listing of basic notions concerning IVP, presents the Acquisti voting protocol. Mainly, it is shown that this protocol does not have the property of invariableness, and is neither receipt-free nor coercion resistant. Section 2 proposes an IVP inspired by the Acquisti protocol. The author claims that this protocol achieves almost all of the properties defined above, but the last section contains (because of space limitations) only short proofs regarding the invariableness, receipt-free, and coercion-resistant properties, with few physical constraints. It would be interesting to find a source where Meng proves the other properties suggested to be verified by his protocol (including privacy, completeness, soundness, fairness, and universal verifiability).

The paper is interesting, but it lacks the useful information (examples included) that would make it a fundamental reference for voting protocols.

Reviewer:  Adrian Atanasiu Review #: CR135511 (0903-0256)
Bookmark and Share
  Reviewer Selected
 
 
Applications (SMTP, FTP, etc.) (C.2.2 ... )
 
 
Data Encryption (E.3 )
 
 
General (C.2.0 )
 
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Applications (SMTP, FTP, etc.)": Date
Design and performance evaluation of NUMA-aware RDMA-based end-to-end data transfer systems
Ren Y., Li T., Yu D., Jin S., Robertazzi T.  SC 2013 (Proceedings of the International Conference for High-Performance Computing, Networking, Storage and Analysis, Denver, CO,  Nov 17-21, 2013) 1-10, 2013. Type: Proceedings
Aug 22 2014
Modeling BitTorrent-like systems with many classes of users
Liao W., Papadopoulos F., Psounis K., Psomas C.  ACM Transactions on Modeling and Computer Simulation 23(2): 1-25, 2013. Type: Article
Nov 18 2013
Security model and framework for information aggregation in sensor networks
Manulis M., Schwenk J.  ACM Transactions on Sensor Networks 5(2): 1-28, 2009. Type: Article
Jun 26 2009
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy