IDEAS home Printed from https://ideas.repec.org/a/igg/jesma0/v3y2011i3p31-48.html
   My bibliography  Save this article

Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners

Author

Listed:
  • Sebastian Obermeier

    (ABB Corporate Research, Switzerland)

  • Stefan Böttcher

    (Universität Paderborn, Germany)

Abstract

A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the protocol are presented, and the detection of malicious behavior like spying, suppressing, inventing, and modifying protocol messages or votes by the protocol is shown. If some participants stop the protocol, a fair information exchange is achieved in the sense that either all votes are guaranteed to be valid and accessible to all participants, or malicious behavior has been detected and the protocol is stopped, but the votes are not disclosed.

Suggested Citation

  • Sebastian Obermeier & Stefan Böttcher, 2011. "Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners," International Journal of E-Services and Mobile Applications (IJESMA), IGI Global, vol. 3(3), pages 31-48, July.
  • Handle: RePEc:igg:jesma0:v:3:y:2011:i:3:p:31-48
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jesma.2011070103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jesma0:v:3:y:2011:i:3:p:31-48. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.