Evaluation:
Published: 28.11.2004.
Language: English
Level: Secondary school
Literature: n/a
References: Not used
  • Essays 'Secure Voting Protocol Design', 1.
  • Essays 'Secure Voting Protocol Design', 2.
  • Essays 'Secure Voting Protocol Design', 3.
  • Essays 'Secure Voting Protocol Design', 4.
Extract

Assumptions
*<Tab/>Central voting server and counter server have a physically secured tamper-proof hardware. So, a potential hacker has no way of physically destroying or altering the hardware of the server.
*<Tab/>Terminal is tamper-proof in the sense that there is no way to open up the terminal or modify its innards without irrevocably breaking the terminal.
*<Tab/>Each terminal has an accurate, tamper-proof clock inside it. This is to allow the voting during the specified time-period
*<Tab/>Each voter has been provided with an ID…

Atlants