Human-computer cryptography: an attempt
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
The Business of Electronic Voting
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Civitas: Toward a Secure Voting System
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Efficient receipt-free voting based on homomorphic encryption
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Secure internet voting with code sheets
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Pretty good democracy for more expressive voting schemes
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Prêt à voter with re-encryption mixes
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
On the security of public key protocols
IEEE Transactions on Information Theory
Attacking the verification code mechanism in the norwegian internet voting system
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Hi-index | 0.00 |
One of the main open issues in electronic government is the fact that the individual users' multi-purpose computing platforms are used. In terms of security, no guarantee is given since these platforms are not under the government authority's control. Even worse, the number of malware infected computing platforms increases. This so-called Secure Platform Problem and approaches aiming to solve it are objects of investigation in this work. We define criteria that need to be ensured to address this problem. Furthermore, we propose a taxonomy to classify existing approaches. Based on the classification and the criteria, we analyze the different types of approaches by providing concrete examples. Hereby, we show that none of the existing approaches fully meets our criteria. Thereby, we focus on the most security critical class of electronic government services, namely electronic voting over the Internet. However, most of the discussed approaches as well as the criteria and classification can also be applied to other governmental applications.