A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
The Business of Electronic Voting
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Internet Voting: Concerns and Solutions
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
Some constraints and tradeoffs in the design of network communications
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
Scratch & vote: self-contained paper-based cryptographic voting
Proceedings of the 5th ACM workshop on Privacy in electronic society
New voter verification scheme using pre-encrypted ballots
Computer Communications
VeryVote: A Voter Verifiable Code Voting System
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Improving remote voting security with codevoting
Towards Trustworthy Elections
Internet voting system with cast as intended verification
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
The secure platform problem taxonomy and analysis of existing proposals to address this problem
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance
Remotegrity: design and use of an end-to-end verifiable remote voting system
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Attacking the verification code mechanism in the norwegian internet voting system
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Hi-index | 0.00 |
Malware on Personal Computers is a major security issue today. This fact implies that all solutions intended to secure Internet-based voting have to be re-evaluated under the assumption that a local malware application is capable of controlling the interface between user and PC. We propose to use paper-based code sheets, originally introduced by Chaum, to overcome this problem, and for the first time give a security analysis of this solution. We show that a modified, 3-step-scheme, can be considered secure against local malware attacks. Our scheme could then particulary be used to held shareholder elections or votes in an associaton over the Internet.