Tamper-proof Election Result Verification System in Resource Constrained Environments

被引:0
|
作者
Rully, Achmad [1 ]
Nakazato, Hidenori [2 ]
机构
[1] Waseda Univ, Grad Sch Global Informat & Telecommun Studies, Tokyo, Japan
[2] Waseda Univ, Dept Commun & Comp Engn, Tokyo, Japan
关键词
tamper-proof election result verification system; election result verification system; verifiable election result;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As an indispensable tool in democracy, election need to be secure and verifiable even in a resource constrain environment, to overcome demography, multicultural and others social challenges. This paper proposes a new election verification system by verifying tally result from each poll station, even in a resource constrain environment, that can conclude a faster and accountable final election result. Through multiple analysis we conclude the proposed system usefulness.
引用
收藏
页码:250 / 257
页数:8
相关论文
共 15 条
  • [1] EngraveChain: Tamper-proof distributed log system
    Shekhtman, Louis
    Waisbard, Erez
    BLOCKSYS'19: PROCEEDINGS OF THE 2019 WORKSHOP ON BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2019, : 8 - 14
  • [2] Extending tamper-proof hardware security to untrusted execution environments
    Loureiro, S
    Bussard, L
    Roudier, Y
    USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 111 - 123
  • [3] A tamper-proof audit and control system for the doctor in the loop
    Kieseberg P.
    Malle B.
    Frühwirt P.
    Weippl E.
    Holzinger A.
    Brain Informatics, 2016, 3 (4) : 269 - 279
  • [4] Tamper-proof operating system for biometric ID Tokens
    Sanchez-Reillo, R
    Vazquez-Navarro, A
    Liu-Jimenez, J
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 319 - 324
  • [5] EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
    Shekhtman, Louis
    Waisbard, Erez
    FUTURE INTERNET, 2021, 13 (06):
  • [6] HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device
    Ahmad, Adil
    Lee, Sangho
    Peinado, Marcus
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1791 - 1807
  • [7] Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
    Corrick, Tristan
    Kumar, Vimal
    UBIQUITOUS SECURITY, 2022, 1557 : 189 - 202
  • [8] Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System
    Goel, Uttkarsh
    Ruhl, Ron
    Zavarsky, Pavol
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 25 - 30
  • [9] Enhancing Security in Low-powerWide-area (LPWA) IoT Environments:The Role of HSM, Tamper-proof Technology,and Quantum Cryptography
    Han, Hyung-Sub
    Choi, Tae-hyuk
    Yoon, Jong-Seong
    JOURNAL OF WEB ENGINEERING, 2024, 23 (06): : 787 - 800
  • [10] Lightweight human activity recognition system for resource constrained environments
    Karandikar, Mihir
    Jain, Ankit
    Srivastava, Abhishek
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (04)