Application of trusted computing in internet voting
Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, i...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.11364 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.113642017-09-17T10:33:40Z Application of trusted computing in internet voting 2009-11 Mohd. Zulkifli, Mohd. Zaid Waqiyuddin QA75 Electronic computers. Computer science Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, its scale and the disastrous consequences of failure. In the academic world however, many interesting techniques and protocols have been discovered that could help improving the security and robustness of Internet voting. Unfortunately, most of the designs often make very demanding assumptions or otherwise, are very limited in their effectiveness. This paper looks at Trusted Computing technology as a means to satisfy some of the assumptions, and to see its effects in improving the overall security of Internet voting architecture. This paper also looks at the possibility of Trusted Computing making certain Internet voting technologies unnecessary or redundant. 2009-11 Thesis http://eprints.utm.my/id/eprint/11364/ http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System Abdul Aziz Bari and Farid Sufian Shuaib (2006). Constitution of Malaysia, Text and Commentary. 2nd Edition. Prentice Hall. Avi Rubin. Security Considerations for Remote Electronic Voting over the Internet. AT&T Labs Bruce Schneier (1996) Applied Cryptography. 2nd Edition. John Wiley & Sons, Inc. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang and Seungjae Yoo. (2003) Providing Receipt-freeness in Mixnet-based Voting Protocols David Challener, Kent Yoder, Ryan Catherman, David Safford, Leen-dert Van Doorn. (2008) A Practical Guide to Trusted Computing. IBM Press. 2008. Election Commision Malaysia (2004). Report of the General Election Malaysia Fujioka, A., Okamoto, T., and Ohka, K. (1993) A Practical Secret Voting Scheme for Large Scale Elections. G. Lowe. (1996) Breaking and fixing the Needham-Schroeder public key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture notes in computer science, pages 147166 Springer. IBM Research. Direct Anonymous Attestation (DAA) . http://www.zurich.ibm.com/security/daa/ Joe Mohen, Julia Glidden (2001) The Case for Internet Voting. Communications of the ACM January 2001/Vol.44,No.1 Joy Marie Forsythe (2005) Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption. Massachusetts Institute of Technology. Lorrie Faith Cranor and Ron K. Cytron. (1996) Design and Implementation of a Practical Security-Conscious Electronic Polling System. Washington University. Mark A. Herschberg (1997) Secure Electronic Voting Over the World Wide Web. Massachusetts Institute of Technology. Office for Democratic Institution and Human Rights. Republic of Estonia Parliamentary Elections (2007) OSCE/ODIHR Election Assessment Mission Report Subariah Ibrahim, Mazleena Salleh and Maznah Kamat. (2000) Electronic Voting System: Preliminary Study. Universiti Teknologi Malaysia. Sebastien Canard, Herve Sibert. (2001) How to Fit Cryptographic E-Voting into Smart Cards. Fundamenta Informaticae XXI 1001-1012. IOS Press. Thomas Tjostheim and Geir Rosland. Remote Electronic Voting Using Verifiable Chain Encryption. Fundamenta Informaticae XX(2006) 1-15. IOS Press. Wolter Pieters. (2006) Acceptance of Voting Technology: Between Confidence and Trust. Xenakis and Macintosh. (2005) Procedural Security and Social Acceptance in EVoting (HICSS'05). |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
QA75 Electronic computers Computer science |
spellingShingle |
QA75 Electronic computers Computer science Mohd. Zulkifli, Mohd. Zaid Waqiyuddin Application of trusted computing in internet voting |
description |
Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, its scale and the disastrous consequences of failure. In the academic world however, many interesting techniques and protocols have been discovered that could help improving the security and robustness of Internet voting. Unfortunately, most of the designs often make very demanding assumptions or otherwise, are very limited in their effectiveness. This paper looks at Trusted Computing technology as a means to satisfy some of the assumptions, and to see its effects in improving the overall security of Internet voting architecture. This paper also looks at the possibility of Trusted Computing making certain Internet voting technologies unnecessary or redundant. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Mohd. Zulkifli, Mohd. Zaid Waqiyuddin |
author_facet |
Mohd. Zulkifli, Mohd. Zaid Waqiyuddin |
author_sort |
Mohd. Zulkifli, Mohd. Zaid Waqiyuddin |
title |
Application of trusted computing in internet voting |
title_short |
Application of trusted computing in internet voting |
title_full |
Application of trusted computing in internet voting |
title_fullStr |
Application of trusted computing in internet voting |
title_full_unstemmed |
Application of trusted computing in internet voting |
title_sort |
application of trusted computing in internet voting |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems |
granting_department |
Faculty of Computer Science and Information System |
publishDate |
2009 |
url |
http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf |
_version_ |
1747814844354002944 |