Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules
نویسندگان
چکیده
Manuscript received November 30, 2009. Current version published February 12, 2010. R. A. Fink is with the Johns Hopkins University/Applied Physics Laboratory, Laurel, MD 20723 USA, and also with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail [email protected]). A. T. Sherman is with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA, and also with the National Center for the Study of Elections, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail: [email protected]). R. Carback is with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail: [email protected]).
منابع مشابه
Combining End-To-End Voting With Trustworthy Computing for Greater Privacy, Trust, Accessibility, and Usability (summary)
We advocate combining Trustworthy Computing (TC) techniques—including Trusted Platform Module (TPM) protocols, application attestation, and reduced software footprints—with end-toend (E2E) technologies, to provide voter and universal verifiability while enhancing privacy, accessibility, and usability through trustworthy electronic systems. Current voting approaches with paper, electronic, and e...
متن کاملSingle Attestation Image for a Trusted and Scalable Grid
Traditionally, Grid users are forced to trust the Grid platforms, but the users are not always regarded as trustworthy. This trust asymmetry hinders the commercializing of Grid resources. Trusted Grid is proposed to tackle this challenge by leveraging Trusted Computing (TC). However, the TC relies on a microcontroller Trusted Platform Modules (TPM) which has limited computing power and is doome...
متن کاملTowards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure
New cost effective commodity PC hardware now includes fully virtualisable processors and the Trusted Computing Group’s trusted platform module (TPM). This provides the opportunity to combine virtualisation, trusted computing and open source software development to tackle the security challenges modern computing faces. We believe that leveraging this technology to partition critical operating sy...
متن کاملHash-Based TPM Signatures for the Quantum World
Trusted Platform Modules (TPMs) provide trust and attestation services to the platforms they reside on, using public key encryption and digital signatures among other cryptography operations. However, the current standards mandate primitives that will be insecure in the presence of quantum computers. In this paper, we study how to eliminate these insecure primitives. We replace RSA-based digita...
متن کاملHigh Assurance Policy-Based Key Management at Low Cost
Past decade has witnessed the availability of Trusted Platform Modules (TPM) on commodity computers. While the most common use of TPM appears to be BitLocker on Windows OS, server class motherboards have not yet enjoyed a similar TPM deployment base. Recent research and products show that the TPM can provide a level of trust on locally executing software. Nonetheless, TPMs haven’t been utilized...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. Information Forensics and Security
دوره 5 شماره
صفحات -
تاریخ انتشار 2010