Votação Anônima Segura Utilizando Lista de Discussão
Abstract
Democracy is an important subject, and its importance is concentrated in the possibility of discussing about a specific subject, going beyond the simple choice among the available options. This article proposes a way of conducting discussions and also polling among the members of a mailing list, which is available through the use of electronic mail, a known and quite used infra-structure. We propose to use mix-networks and secret sharing technics in order to achieve the required security requirements to the polling system using a mailing list.References
Araújo, R. S. D. S. (2002). Protocolos criptográficos para votação digital. Master's thesis, Universidade Federal de Santa Catarina.
Chaum, D. (1981). Untraceable eletronic mail, return addresses, and digital pseudonyms. Comunication of the ACM, pages 84-88.
Davis, M. (2003). evote adds election to mailing lists. Linux Journal, 107.
Gennaro, R., R. M. O. R. T. (1998). Simplified vss and fast-track multiparty computations with applications to threshold cryptography. Proceedings of the 1998 ACM Symposium on Principles of Distributed Computing.
Shamir, A. (1979). How to share a secret. Communications of the ACM, Volume 22, pages 612-613.
Chaum, D. (1981). Untraceable eletronic mail, return addresses, and digital pseudonyms. Comunication of the ACM, pages 84-88.
Davis, M. (2003). evote adds election to mailing lists. Linux Journal, 107.
Gennaro, R., R. M. O. R. T. (1998). Simplified vss and fast-track multiparty computations with applications to threshold cryptography. Proceedings of the 1998 ACM Symposium on Principles of Distributed Computing.
Shamir, A. (1979). How to share a secret. Communications of the ACM, Volume 22, pages 612-613.
Published
2004-05-10
How to Cite
DIAS, Júlio S.; PEREIRA, Fabiano C.; CUSTÓDIO, Ricardo F.; DE ROLT, Carlos R..
Votação Anônima Segura Utilizando Lista de Discussão. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 4. , 2004, Gramado.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2004
.
p. 119-128.
DOI: https://doi.org/10.5753/sbseg.2004.21231.
