Electronic Voting using Identity Based Cryptography

Producción científica: Capítulo del libro/informe/acta de congresoContribución a la conferenciarevisión exhaustiva

3 Citas (Scopus)

Resumen

Today voting processes are the most important element of democracy as the societys way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols. Most of them use a Public Key Infrastructure. In this paper, we propose the use of Bilinear Pairings, first implementation of Identity Based Cryptography, in order to provide stronger security requirements than protocols based on Public Key Infastructure and without requiring the entire infrastructure needed by them. We make a comparative analysis of our proposal with previous proposals, which is based on the total number of needed key pairs and required authorities by those protocols.

Idioma originalInglés
Título de la publicación alojada4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010
Subtítulo de la publicación alojadaThe 1st International Conference on Technical and Legal Aspects of the e-Society
Páginas31-36
Número de páginas6
DOI
EstadoPublicada - 2010
Evento4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: 1st International Conference on Technical and Legal Aspects of the e-Society - St. Maarten
Duración: 10 feb. 201016 feb. 2010

Serie de la publicación

Nombre4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: The 1st International Conference on Technical and Legal Aspects of the e-Society

Conferencia

Conferencia4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: 1st International Conference on Technical and Legal Aspects of the e-Society
CiudadSt. Maarten
Período10/02/1016/02/10

Huella

Profundice en los temas de investigación de 'Electronic Voting using Identity Based Cryptography'. En conjunto forman una huella única.

Citar esto