Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Hi-index | 0.00 |
In this paper, I describe the security problem of Internet voting systems. First, the general security gap of the Internet is described. Second, a possible voting scenario, based on blind signatures is sketched. Third, specific security problems related to Internet voting are presented. In particular, authorization and anonymity of voters must play together well.