• 제목/요약/키워드: Internet Electronic Voting

검색결과 18건 처리시간 0.019초

Aspects of Regulatory and Legal Implications on evoting

  • Kosmopoulos, Athanassios
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2004년도 International Conference on Digital Policy & Management
    • /
    • pp.311-331
    • /
    • 2004
  • This paper addresses the democracy-oriented regulatory and legal requirements that e-democracy impacts. It demonstrates that the structure of the political system also plays a significant role in the decision to develop an e-voting application. The short term perspective of the questions put before the electorate obliterate the long term perspective in which many policy problems have to be seen. A well-designed e-voting system should produce an audit trail that is even stronger than that of conventional systems (including paper-based systems). Remote Internet voting systems pose significant risk to the integrity of the voting process, and should not be fielded for use in public elections until substantial technical and social science issues are addressed. Conclusively the paper focuses on the specific attributes an electronic voting (polling place) system should respect and ensure such as transparency, verifiability, accountability, security and accuracy in relation to the constitutional requirements such as General, Free. Equal, Secret, Direct and Democratic.

  • PDF

전자투표에서 익명성 보장을 위한 빠르고 안전한 방식 (A Fast and Secure Method to Preserve Anonymity in Electronic Voting)

  • 양형규
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.245-251
    • /
    • 2014
  • Mix 네트워크는 전자투표 시스템에서 익명성 보장을 위해서 중요한 역할을 담당하고 있으며 많은 mixnet 방식들이 현재까지 제안되고 있다. 그러데, 기존의 방식들은 안전한 mixing 동작들을 구현하기 위해서 복잡하고 비용부담이 있는 영지식 증명 방식을 사용하고 있다. 2010년도에 Seb$\acute{e}$ 등은 암호학적으로 안전한 해쉬 함수를 사용해서 효율적이고 비용 부담이 적은 mixnet 방식을 제안하였다. 본 논문에서 우리는 같은 가정하에서 Seb$\acute{e}$의 방식보다 안전하고 효율적이고 빠른 방식을 제안한다.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

Applied Practices on Blockchain based Business Application

  • Park, Bo Kyung
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.198-205
    • /
    • 2021
  • With the development of blockchain technology, the scope of blockchain applications has expanded rapidly. Blockchain decentralization allows transaction participants to make transparent and safe transactions without a third trust agency. A distributed ledger-based system enables transparent and trusted business for anonymous users. For this reason, many companies apply blockchain to various fields such as logistics, electronic voting, and real estate. Despite this interest, there are still not enough case studies confirming the potential of blockchain as a concrete business model. Therefore, it is necessary to study how blockchain technology can change the existing business model and connect it to a new business model. In this paper, we propose blockchain-based business models and workflow types in various fields such as healthcare, logistics, and energy. We also present application cases. We expect to help companies apply blockchain to their business.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

뉴스서비스별 전자투표시스템 관련 가짜뉴스가 뉴스 이용자의 이용 태도, 선거 참여 의도, 뉴스서비스 신뢰도에 미치는 영향 (The Effect of the Fake News Related to the Electronic Voting System each News Service on News Users' Attitude of Using System, Intention to Participate through System and Reliability of News Services)

  • 진소연;이지은
    • 한국콘텐츠학회논문지
    • /
    • 제21권1호
    • /
    • pp.105-118
    • /
    • 2021
  • 본 연구의 목적은 가짜뉴스가 크고 작은 사회적 문제를 야기한다는 점에 주목하여, 전자투표시스템 관련 가짜뉴스가 뉴스 이용자의 시스템 이용에 대한 태도, 시스템을 통한 선거 참여 의도, 뉴스서비스 신뢰도에 어떠한 영향력을 미치는지 실험을 통해 확인하는데 있다. 연구결과, 부정적인 내용으로 프레임된 가짜뉴스는 이용자의 태도와 선거 참여 의도 수준을 감소시키는 효과를 보였다. 특히 각 뉴스서비스에 따른 가짜뉴스 영향력 차이를 검증한 결과, 이용자가 일반 인터넷신문을 통해 가짜뉴스에 노출되고 해당 뉴스가 가짜임을 인지한 경우에는 태도와 선거 참여 의도 수준이 감소 후 다시 회복되는 모습을 보였다. 하지만 네이버와 페이스북 가짜뉴스에 노출된 이용자들은 가짜뉴스에 담긴 부정적인 내용을 더욱 강하게 형성하는 것으로 나타났다. 가짜뉴스가 이용자의 인지적 차원에 영향력을 행사하고, 최초 노출 정보와 일치하는 방향으로 인식을 강화하려는 경향이 있다는 사실을 실증적으로 확인하였다.

공동체 활동을 기반으로 한 스마트빌리지 기술개발 수요분석 (Demand Analysis of Technology Development for Smart Village based on Community Activities)

  • 박소연;조혜진;정남수
    • 농촌계획
    • /
    • 제26권2호
    • /
    • pp.117-126
    • /
    • 2020
  • In this study, demands of smart technology development were analyzed for rural village communities. Questionnaire items were derived by grasping the current status of information and communication technology. 49 villages in 8 regions were selected and surveys and statistical analysis were conducted. The main results of the study are as follows. First, 92% of community leaders use smartphones, search for information (38%), communicate with the Internet (36%) using smartphones, use KakaoTalk (31%), and Facebook (24%). Second, in the rural and urban exchange activities, promote support information service (51%) and promote method suggestion service (48.5%) showed that the demand for services in promote field was high. It is linked to the creation of economic opportunities. Third, in the income and production activities, demand for distribution services technology (39.3%) was high in the field of production and distribution, and cold chains that help maintain freshness until food, such as meat, fish, and vegetables are delivered to consumers when agricultural products are distributed. The constant temperature control system needs to be actively introduced. Fourth, autonomy activities showed the highest demand for air conditioning and control systems (34.2%) of community building, and the lowest demand for electronic voting (9.4%) and videoconferencing (9.4%) services. Lastly, in the general activity area of the community, the demand for technology of emergency services (37.1%) and health self-diagnosis service (35.4%), which are technologies in the welfare sector, ranked first and second respectively.