Reference Hub2
Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners

Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners

Sebastian Obermeier, Stefan Böttcher
Copyright: © 2011 |Volume: 3 |Issue: 3 |Pages: 18
ISSN: 1941-627X|EISSN: 1941-6288|EISBN13: 9781613507032|DOI: 10.4018/jesma.2011070103
Cite Article Cite Article

MLA

Obermeier, Sebastian, and Stefan Böttcher. "Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners." IJESMA vol.3, no.3 2011: pp.31-48. http://doi.org/10.4018/jesma.2011070103

APA

Obermeier, S. & Böttcher, S. (2011). Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners. International Journal of E-Services and Mobile Applications (IJESMA), 3(3), 31-48. http://doi.org/10.4018/jesma.2011070103

Chicago

Obermeier, Sebastian, and Stefan Böttcher. "Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners," International Journal of E-Services and Mobile Applications (IJESMA) 3, no.3: 31-48. http://doi.org/10.4018/jesma.2011070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the protocol are presented, and the detection of malicious behavior like spying, suppressing, inventing, and modifying protocol messages or votes by the protocol is shown. If some participants stop the protocol, a fair information exchange is achieved in the sense that either all votes are guaranteed to be valid and accessible to all participants, or malicious behavior has been detected and the protocol is stopped, but the votes are not disclosed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.