Auflistung nach Autor:in "Langer, Lucie"
1 - 5 von 5
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragClassifying privacy and verifiability requirements for electronic voting(Informatik 2009 – Im Focus das Leben, 2009) Langer, Lucie; Schmidt, Axel; Volkamer, Melanie; Buchmann, Johannes
- KonferenzbeitragElektronische Wahlen: Verifizierung vs. Zertifizierung(Informatik 2009 – Im Focus das Leben, 2009) Volkamer, Melanie; Schryen, Guido; Langer, Lucie; Schmidt, Axel; Buchmann, Johannes
- KonferenzbeitragLong-term Retention in E-Voting – Legal Requirements and Technical Implementation(Electronic Voting 2008 (EVOTE08). 3rd International Conference on Electronic Voting 2008, Co-organized by Council of Europe, Gesellschaft für Informatik and EVoting.CC, 2008) Gitter, Rotraud; Langer, Lucie; Okunick, Susanne; Opitz-Talidou, ZoiLegally binding elections require retention of specified election data such as balloting material. This applies to paper-based as well as electronic elections. However, in Germany, legal requirements on retention in e-voting have not been issued so far. Based on the German legal framework for governmental as well as non-governmental paper-based elections, we give recommendations on long-term retention in e-voting, applying our results to a state-of-the-art e-voting scheme. We also review technical measures to meet the security requirements of long-term retention in e-voting.
- KonferenzbeitragA pervasively verifiable online voting scheme(INFORMATIK 2008. Beherrschbare Systeme – dank Informatik. Band 1, 2008) Langer, Lucie; Schmidt, Axel; Araújo, RobertoWe present an improvement of Ohkubo et al.’s e-voting protocol [OMA+99]: We provide that the validator’s signature is attached directly to the vote although the vote has been encrypted before. Thus verifiability does not end before tallying like in the original scheme but is pervasive even beyond the end of the election. This prevents manipulation of the plaintext votes and offers verifiability to the public instead of restricting it to the talliers. Moreover, privacy can be ensured without using blind signatures, which facilitates receipt-freeness. Our variant of the scheme also allows the voter to seemingly comply with the demand of a coercer while actually casting the vote she intended.
- KonferenzbeitragTowards the impact of the operational environment on the security of e-voting(Informatik 2009 – Im Focus das Leben, 2009) Schmidt, Axel; Volkamer, Melanie; Langer, Lucie; Buchmann, Johannes