A Robust Electronic Voting Scheme Against Side Channel Attack
نویسندگان
چکیده
YI-NING LIU, WEI GUO, CHI CHENG, CHINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology Guilin, 541004 P.R. China School of Computer Science China University of Geosciences Wuhan, 430074 P.R. China Computer School Central China Normal University Wuhan, 430079 P.R. China College of Mathematics and Computer Science Fujian Normal University Fuzhou, 350117 P.R. China E-mail: [email protected]
منابع مشابه
Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملOn the Correctness of an Approach against Side-Channel Attacks
Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetric encryption scheme is IND-secure in side-channel model, if it is IND-secure in black-box model and there is no adversary who can recover the whole key of the scheme computationally in side-channel model, i.e. WKR-SCA ∧ IND → IND...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملCodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment
One of the major problems that prevent the widespread of Internet voting is the vulnerability of the voter’s computer. A computer connected to the Internet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possibl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 32 شماره
صفحات -
تاریخ انتشار 2016