Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules

نویسندگان

  • Russell A. Fink
  • Alan T. Sherman
  • Richard Carback
چکیده

Manuscript received November 30, 2009. Current version published February 12, 2010. R. A. Fink is with the Johns Hopkins University/Applied Physics Laboratory, Laurel, MD 20723 USA, and also with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail [email protected]). A. T. Sherman is with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA, and also with the National Center for the Study of Elections, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail: [email protected]). R. Carback is with the Cyber Defense Lab, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD 21250 USA (e-mail: [email protected]).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combining End-To-End Voting With Trustworthy Computing for Greater Privacy, Trust, Accessibility, and Usability (summary)

We advocate combining Trustworthy Computing (TC) techniques—including Trusted Platform Module (TPM) protocols, application attestation, and reduced software footprints—with end-toend (E2E) technologies, to provide voter and universal verifiability while enhancing privacy, accessibility, and usability through trustworthy electronic systems. Current voting approaches with paper, electronic, and e...

متن کامل

Single Attestation Image for a Trusted and Scalable Grid

Traditionally, Grid users are forced to trust the Grid platforms, but the users are not always regarded as trustworthy. This trust asymmetry hinders the commercializing of Grid resources. Trusted Grid is proposed to tackle this challenge by leveraging Trusted Computing (TC). However, the TC relies on a microcontroller Trusted Platform Modules (TPM) which has limited computing power and is doome...

متن کامل

Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure

New cost effective commodity PC hardware now includes fully virtualisable processors and the Trusted Computing Group’s trusted platform module (TPM). This provides the opportunity to combine virtualisation, trusted computing and open source software development to tackle the security challenges modern computing faces. We believe that leveraging this technology to partition critical operating sy...

متن کامل

Hash-Based TPM Signatures for the Quantum World

Trusted Platform Modules (TPMs) provide trust and attestation services to the platforms they reside on, using public key encryption and digital signatures among other cryptography operations. However, the current standards mandate primitives that will be insecure in the presence of quantum computers. In this paper, we study how to eliminate these insecure primitives. We replace RSA-based digita...

متن کامل

High Assurance Policy-Based Key Management at Low Cost

Past decade has witnessed the availability of Trusted Platform Modules (TPM) on commodity computers. While the most common use of TPM appears to be BitLocker on Windows OS, server class motherboards have not yet enjoyed a similar TPM deployment base. Recent research and products show that the TPM can provide a level of trust on locally executing software. Nonetheless, TPMs haven’t been utilized...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Information Forensics and Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010