To Du or not to Du: A Security Analysis of Du-Vote - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

To Du or not to Du: A Security Analysis of Du-Vote

Steve Kremer
Peter Rønne

Résumé

Du-Vote is a recently presented remote electronic voting scheme. Its goal is to be malware tolerant, i.e., provide security even in the case where the platform used for voting has been compromised by dedicated malware. For this it uses an additional hardware token, similar to tokens distributed in the context of online banking. The token is software closed and does not have any communication means other than a numerical keyboard and a small display. Du-Vote aims at providing vote privacy as long as either the vote platform or the vote server is honest. For verifiability, the security guarantees are even higher, as even if the token's software has been changed, and the platform and the server are colluding, attempts to change the election outcome should be detected with high probability. In this paper we provide an extensive security analysis of Du-Vote and show several attacks on both privacy as well as verifiability. We also propose changes to the system that would avoid many of these attacks.
Fichier principal
Vignette du fichier
SecurityAnalysis.pdf (316.24 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01238894 , version 1 (07-12-2015)

Identifiants

  • HAL Id : hal-01238894 , version 1

Citer

Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium on Security and Privacy 2016 , Mar 2016, Saarbrucken, Germany. ⟨hal-01238894⟩
326 Consultations
592 Téléchargements

Partager

Gmail Facebook X LinkedIn More