Many of us include dealt with electronic commerce deals. This is currently a part of everyday activities. However , e-voting is not yet an obvious way for voting. The development of electronic digital voting method is one of the most challenging security-critical jobs, because of the requirement for finding a trade-off between a large number of seemingly contradictory security requirements like privacy vs . auditability. Thereby it is difficult to adopt ordinary mechanisms of e-commerce. For example , in e-commerce there is always a possibility to challenge about the content of ventures. Buyers receive receipts to prove their particular participation in transactions. E-voters, in turn, should not get virtually any receipts, because this would permit voters to market their ballots.
In 2003, Estonia started the project of e-voting. The aim was going to implement e-voting in the elections of the local government councils in 2005. In January 2005, a group of American security specialists revealed the security report of Secure Electronic Registration and Voting Test (SERVE) . The SERVE program was organized for application in the 2005 primary and general elections and permits eligible voters to election electronically via Internet. After examining the safety of SERVE, the number of security professionals recommended that SERVE ought to be shut down. Additionally, they declared that they can do not believe that differently constituted projects could possibly be more secure than SERVE. Their particular conclusion is that the real boundaries to achievement in e-voting are not abilities, resources, etc; it is the reality given the latest Internet and PC secureness technology, e-voting is an essentially extremely hard task.
The SERVE job was ended indeed in January 2005. At the same time, Estonia continued to develop an e-voting system and implemented that according to the ideas. The Estonian security experts published their security analysis  by the end of the year 2003. They reported that in practical perception the Estonian e-voting product is secure enough for setup.
This contradicting situation was the main initiator of this work. By nearer view, both equally security information are constant and have truthful and convincing disputes. One of the main reasons for 2 totally different outcomes was the insufficient unified logical security analysis in both reports. A few of the arguments had been quite emotional, being depending on experts' very subjective opinions and " common wisdomвЂќ.
The goal of the work is to adapt logical security examination methods for studying the two evoting systems. It gives us the possibility to assess the useful security of such systems.
In absolutely safeguarded systems unexpected events are generally not possible. We may dream about these kinds of systems, but they can never be achieved in practice. This kind of applies specifically to evoting systems. With the security degree of personal computers, it really is impossible to develop e-voting devices, which are completely secure for every user. The most important security objective of voting is to never affect the final results and not to abuse the principles of10 democracy. The single situations with users are still important but they you don't have influence towards the final result. In addition, even in traditional voting systems small-scale incidents happen to be acceptable. Consequently , in practical security examination of e-voting we should concentrate on large-scale dangers.
One of the realistic approaches of security is well known from theoretical cryptography: reliability reductions, that happen to be proofs that security circumstances held beneath certain combinatorial assumptions, such as hardness of factoring or Diffie-Hellman difficulty. For proving practical reliability, we also need empirical presumptions about the real world. Moreover, in theoretical cryptography the adversaries are considered to get Turing equipment, which are well-defined and relatively easy to study. Real life adversaries happen to be human beings with unpredictable habit and different purposes. Hence, for analyzing useful security, we really need real world attacker models. Right now there...
, 08 singles
, 100 years
, 12 months
, 2002 albums
, 2013 2013
, 3 years ago
, 3rd millennium