Threat Analysis of a Practical Voting Scheme with Receipts
Kutylowski et al. have introduced a voter-verifiable electronic voting scheme “a practical voting scheme with receipts”, which provides each voter with a receipt. The voter can use her receipt to check whether her vote has been properly counted in the fin
- PDF / 4,236,339 Bytes
- 198 Pages / 430.15 x 660.926 pts Page_size
- 87 Downloads / 176 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4896
Ammar Alkassar Melanie Volkamer (Eds.)
E-Voting and Identity First International Conference, VOTE-ID 2007 Bochum, Germany, October 4-5, 2007 Revised Selected Papers
13
Volume Editors Ammar Alkassar Sirrix AG security technologies Im Stadtwald D3.2, 66123 Saarbrücken, Germany E-mail: [email protected] Melanie Volkamer University of Passau, Institute of IT-Security and Security Law Innstr. 43, 94032 Passau, Germany E-mail: [email protected]
Library of Congress Control Number: 2007941815 CR Subject Classification (1998): E.3, D.4.6, C.2, J.1, H.2.0, K.5.2, K.6.5, K.4.4 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-540-77492-0 Springer Berlin Heidelberg New York 978-3-540-77492-1 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12210206 06/3180 543210
Foreword
Voting and identity have a very delicate relationship. Only a few processes depend so much on an identity management respecting the fine line between reliable identification and reliable non-identifiability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassar proposed analyze the technical, socio-
Data Loading...