Application of trusted computing in internet voting

Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, i...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.11364
record_format uketd_dc
spelling my-utm-ep.113642017-09-17T10:33:40Z Application of trusted computing in internet voting 2009-11 Mohd. Zulkifli, Mohd. Zaid Waqiyuddin QA75 Electronic computers. Computer science Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, its scale and the disastrous consequences of failure. In the academic world however, many interesting techniques and protocols have been discovered that could help improving the security and robustness of Internet voting. Unfortunately, most of the designs often make very demanding assumptions or otherwise, are very limited in their effectiveness. This paper looks at Trusted Computing technology as a means to satisfy some of the assumptions, and to see its effects in improving the overall security of Internet voting architecture. This paper also looks at the possibility of Trusted Computing making certain Internet voting technologies unnecessary or redundant. 2009-11 Thesis http://eprints.utm.my/id/eprint/11364/ http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System Abdul Aziz Bari and Farid Sufian Shuaib (2006). Constitution of Malaysia, Text and Commentary. 2nd Edition. Prentice Hall. Avi Rubin. Security Considerations for Remote Electronic Voting over the Internet. AT&T Labs Bruce Schneier (1996) Applied Cryptography. 2nd Edition. John Wiley & Sons, Inc. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang and Seungjae Yoo. (2003) Providing Receipt-freeness in Mixnet-based Voting Protocols David Challener, Kent Yoder, Ryan Catherman, David Safford, Leen-dert Van Doorn. (2008) A Practical Guide to Trusted Computing. IBM Press. 2008. Election Commision Malaysia (2004). Report of the General Election Malaysia Fujioka, A., Okamoto, T., and Ohka, K. (1993) A Practical Secret Voting Scheme for Large Scale Elections. G. Lowe. (1996) Breaking and fixing the Needham-Schroeder public key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture notes in computer science, pages 147166 Springer. IBM Research. Direct Anonymous Attestation (DAA) . http://www.zurich.ibm.com/security/daa/ Joe Mohen, Julia Glidden (2001) The Case for Internet Voting. Communications of the ACM January 2001/Vol.44,No.1 Joy Marie Forsythe (2005) Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption. Massachusetts Institute of Technology. Lorrie Faith Cranor and Ron K. Cytron. (1996) Design and Implementation of a Practical Security-Conscious Electronic Polling System. Washington University. Mark A. Herschberg (1997) Secure Electronic Voting Over the World Wide Web. Massachusetts Institute of Technology. Office for Democratic Institution and Human Rights. Republic of Estonia Parliamentary Elections (2007) OSCE/ODIHR Election Assessment Mission Report Subariah Ibrahim, Mazleena Salleh and Maznah Kamat. (2000) Electronic Voting System: Preliminary Study. Universiti Teknologi Malaysia. Sebastien Canard, Herve Sibert. (2001) How to Fit Cryptographic E-Voting into Smart Cards. Fundamenta Informaticae XXI 1001-1012. IOS Press. Thomas Tjostheim and Geir Rosland. Remote Electronic Voting Using Verifiable Chain Encryption. Fundamenta Informaticae XX(2006) 1-15. IOS Press. Wolter Pieters. (2006) Acceptance of Voting Technology: Between Confidence and Trust. Xenakis and Macintosh. (2005) Procedural Security and Social Acceptance in EVoting (HICSS'05).
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
Application of trusted computing in internet voting
description Over the years, improvements in technology and security, along with our increasing comfort with the Internet, have seen many applications and services being delivered online. Despite this, the adoption of Internet voting has been remarkably slow, mainly due to the unique requirements of elections, its scale and the disastrous consequences of failure. In the academic world however, many interesting techniques and protocols have been discovered that could help improving the security and robustness of Internet voting. Unfortunately, most of the designs often make very demanding assumptions or otherwise, are very limited in their effectiveness. This paper looks at Trusted Computing technology as a means to satisfy some of the assumptions, and to see its effects in improving the overall security of Internet voting architecture. This paper also looks at the possibility of Trusted Computing making certain Internet voting technologies unnecessary or redundant.
format Thesis
qualification_level Master's degree
author Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
author_facet Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
author_sort Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
title Application of trusted computing in internet voting
title_short Application of trusted computing in internet voting
title_full Application of trusted computing in internet voting
title_fullStr Application of trusted computing in internet voting
title_full_unstemmed Application of trusted computing in internet voting
title_sort application of trusted computing in internet voting
granting_institution Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems
granting_department Faculty of Computer Science and Information System
publishDate 2009
url http://eprints.utm.my/id/eprint/11364/6/MohdZaidWaqiyuddinMFSKSM2009.pdf
_version_ 1747814844354002944