Loading...

Analysis of Security Properties of E-voting Protocols: A Provable-security Approach

Toroghi Haghighat, Ali Reza | 2013

1027 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 44725 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jalili, Rasool
  7. Abstract:
  8. Recent violation of security properties of e-voting protocols not using provable security, indicates the importance of provable security. In this thesis, we use the provable security approach to analyze security properties of e-voting protocols.In addition to presenting an efficient and provably secure protocol, the minimal assumptions to achieve privacyin e-voting protocols are analyzed. The firstcon-tribution of this thesis is presenting an efficient and provably secure coercion-resistant protocol, which is a variant of the JCJ e-voting protocol (Juels et al.,2010). It decreases the total number of JCJ’s operations fromO(n2) to O(n). The second contribution of this thesis is proving the minimal assumptions to achieve privacy in e-voting protocols. This thesis demonstrates that preserving privacy in e-voting protocols requires the provision of at least one of the fol-lowing assumptions: limited computational power of adversary, existence of an untappable/anonymous channel between voters and authorities, or physical as-sumptions
  9. Keywords:
  10. Electronic Voting ; Privacy ; Provable Security ; Coercion Resistance

 Digital Object List

 Bookmark

...see more