Design and implementation of a novel secure internet voting protocol using Java Card 3 technology
نویسندگان
چکیده
Internet voting is highly regarded for its speed, automatic counting, cost reduction and lower possibility of error. However, in order to replace traditional voting system with internet-voting, i-voting must meet many requirements and overcome some challenges like collusion, uncoercibility, unfairness and in particular voter insecure platforms. In this paper, we propose a very practical and secure internet voting protocol based on FOO with use of Java Card 3 which can help prevent voting fraud and addresses its major challenges. Java Card 3 technology is a new concept which provides the expected client-side security in a much higher level than an ordinary PC, which is highly vulnerable to infection via the network. Since with Java Card 3 technology the card acts as a secure web client (server) can address the voter side insecure platform problem which is one of main reasons for the delay in implementing I-voting in real world.
منابع مشابه
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept
Recently, there has been a spate of interest in Internet voting systems because of advantages such as participation, efficiency, accuracy, and transparency. However, challenges for having a secure i-voting system are considerable. Unless these systems are designed and implemented carefully, citizens might lose their trust on the whole voting process. This paper introduces a novel online voting ...
متن کاملSecure E-voting Using Homomorphic Technology
Voting is one of the most important activities in a democratic society. In a traditional voting environment voting process sometimes becomes quite inconvenient due to the reluctance of certain voters to visit a polling booth to cast votes besides involving huge social and human resources. The development of computer networks and elaboration of cryptographic techniques facilitate the implementat...
متن کاملVerification of Cryptographic Protocols Implemented in Java Card
Cryptographic protocols are used to ensure secure communications in a hostile environment, when the decisions taken by the principals depend crucially on the authenticity and integrity of messages that they receive. Typically, when a message is received, a principal wants to be sure that this message has been created recently and in good faith for a particular purpose by the principal who claim...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملImplementing a Formally Verifiable Security Protocol in Java Card
This paper describes a case study in refining an abstract security protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal specification and verification in the design process and for the final implem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJBIS
دوره 17 شماره
صفحات -
تاریخ انتشار 2014