Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An Internet voting system supporting user privacy
Kiayias A., Korman M., Walluck D.  ACSAC 2006 (Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, FL, Dec 11-15, 2006)165-174.2006.Type:Proceedings
Date Reviewed: Jan 27 2010

The objective of this paper is to provide a free open-source electronic voting (e-voting) system that works over the Internet. This is in contrast to many proprietary systems that hide their code, making auditing and evaluation impossible.

Kiayias, Korman, and Walluck’s system uses a bulletin board, “a public channel with memory, where all authenticated users ... can append data.” For the database, “authentication is performed by a Kerberos-like ‘gatekeeper’ server.”

The paper also details protocols for interacting with this database, including the ElGamal encryption system and threshold encryption schemes. The authors list several vulnerabilities, including distributed key generation, voter verifiability, viruses, and denial-of-service (DoS) attacks.

The system addresses several known problems with voting systems. It has a number of innovative features worthy of further study by the cryptographic community.

Reviewer:  Angele M. Hamel Review #: CR137672 (1011-1189)
Bookmark and Share
 
Privacy (K.4.1 ... )
 
 
Systems Analysis And Design (K.6.1 ... )
 
 
Project And People Management (K.6.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Privacy": Date
Handbook of personal data protection
Madsen W., Stockton Press, New York, NY, 1992. Type: Book (9780333569207)
Nov 1 1993
Privacy and security issues in information systems
Turn R., Ware W., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
Data bases
Burnham D., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy