Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
On verifiable internet voting systems
Download
index.pdf
Date
2016
Author
Muş, Köksal
Metadata
Show full item record
Item Usage Stats
122
views
64
downloads
Cite This
After the Estonian Parliamentary Elections held in 2011, an additional verification mechanism was integrated into the i-voting system in order to resist malicious voting devices, including the so-called Student’s Attack. This mechanism gives voters the opportunitytoverifywhetherthevotetheycastisstoredinthecentralsystemcorrectly. However, the verification phase ends by displaying the cast vote in plain form on the verification device. Indeed, when applied in wide range, this would even compromise the fairness and the overall secrecy of the elections. In this work, our aim is to investigate this verification phase in detail and to point out that displaying the cast vote in plain form may leak voter privacy. In this respect, we propose an alternative verification mechanism for the Estonian i-voting system to overcome this vulnerability. Not only is the proposed mechanism secure and resistant against corrupted verification devices, so does it successfully verify whether the vote is correctly stored in the system. We also highlight that our proposed mechanism brings only symmetric encryptions and hash functions on the verification device, thereby mitigating these weaknesses in an efficient way. More concretely, it brings only m additional symmetric key decryptions to the verification device, with m denoting the number of candidates. Finally, we prove the security of the proposed verification mechanism and compare the cost complexity of the proposed method with that of the current mechanism.
Subject Keywords
Cryptography.
,
Data protection.
,
Electronic voting.
,
Computer security.
,
Data encryption (Computer science).
URI
http://etd.lib.metu.edu.tr/upload/12619973/index.pdf
https://hdl.handle.net/11511/25636
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
On provable security of some public key encryption schemes
Hanoymak, Turgut; Akyıldız, Ersan; Selçuk, Ali Aydın; Department of Cryptography (2012)
In this thesis, we analyse the security criteria of some public key encryption schemes. In this respect, we present the notion of adversarial goals and adversarial capabilities. We give the definition of provably security by means of several games between the challenger and the adversary in some security models, namely the standard model and the random oracle model. We state the main differences between these two models and observe the advantage of the success probability of the adversary in breaking the cr...
Internet voting based on homomorphic encryption
Yıldırım, Hakan; Uğuz, Muhiddin; Kiraz, Mehmet Sabır; Department of Cryptography (2014)
Some of the countries use classical methods for elections. In such voting systems, people are forced to be in a predefined place and have to cast their votes in a limited time interval. Parallel to economic growth, priority of time on people’s life increased and such kind of limitations decreases the number of people who cast their vote. In order to make people’s lives easier, we need to add usable automated systems to elections such as Internet Voting (i-voting) systems. However, constructing an i-voting s...
The Welfare Party, The Justice and Development Party and democracy : change or continuity?
Gelir, Fatma Senem; Özçoban Üstüner, Fahriye; Department of Political Science and Public Administration (2006)
Through this thesis, it is aimed to study the democracy understanding of the Welfare Party (the WP), which was closed down in 1998 by the decision of the Constitutional Court, and the Justice and Development Party (the JDP), which leaved the November 2002 general elections as the leading party and has still been running the country as the single party, in a comparative way. Since the foundation of the JDP, the founders have presented the JDP as a new political formation, which is different from the WP, with...
"The conservative-democratic" identity of the Justice and Development Party in the Turkish center-right tradition
Topcuoğlu, Leman Sinem; Aslan Akman, Canan; Department of Political Science and Public Administration (2006)
Trough this thesis, it is aimed to study "the conservative-democratic" identity of the Justice and Development Party(AKP), which was established just before the November 3, 2002 elections and has still been running the country as the single party, in the context of the Turkish center-right tradition. Although the AKP comes from the political legancy of the National View Tradition (MG), it has presented itself as a new political formation at least aspiring to a centrist location in the political spectrum.Thu...
Media, politics and slanted news coverage during election periods-case study of AKP
Çağlayan, Eda; Kaya, Ahmet Raşit; Department of Media and Cultural Studies (2010)
This thesis aims to study the attitude of media towards AKP (Adalet ve Kalkınma Partisi - Justice and Development Party) during the 2002 and 2007 general legislative elections in Turkey. Three national newspapers were selected in the scope of analysis: Hürriyet, Sabah an Yeni Şafak in two months period before 2002 General Elections and 2007 General Elections (September, 1- October, 31 2002, June, 1 –July, 21 2007). Media are assumed to have a defining role on the formation of opinions due to the fact that t...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. Muş, “On verifiable internet voting systems,” Ph.D. - Doctoral Program, Middle East Technical University, 2016.