Cucurull et al., 2014 - Google Patents
Qr steganography: A threat to new generation electronic voting systemsCucurull et al., 2014
View PDF- Document ID
- 1880355659969286634
- Author
- Cucurull J
- Guasch S
- Escala A
- Navarro-Arribas G
- Acín V
- Publication year
- Publication venue
- 2014 11th International Conference on Security and Cryptography (SECRYPT)
External Links
Snippet
Quick Response (QR) codes, used to store machine readable information, have become very commonnowa days and have found many applications in different scenarios. One of such applications is electronic voting systems. Indeed, some electronic voting systems are …
- 238000000034 method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hao et al. | Real-world electronic voting: Design, analysis and deployment | |
| US8243338B2 (en) | Providing privacy for electronic voting using encryption | |
| CN108092779A (en) | A kind of method and device for realizing electronic signature | |
| CN104392260A (en) | Two-dimensional code anti-counterfeiting method based on additional information | |
| US20160132871A1 (en) | Secure redemption code generation for gift cards and promotions | |
| CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
| CN102647423A (en) | Identifying method and system of digital signature and seal | |
| Bokslag et al. | Evaluating e-voting: theory and practice | |
| US20220406114A1 (en) | Cryptographically secured paper ballot voting system | |
| Falkner et al. | E-voting Authentication with QR-codes | |
| Popoveniuc et al. | Performance requirements for {End-to-End} verifiable elections | |
| Rivest et al. | Software independence revisited | |
| Pegorini et al. | Security and threats in the Brazilian e-voting system: A documentary case study based on public security tests | |
| Cucurull et al. | Qr steganography: A threat to new generation electronic voting systems | |
| KR20200085204A (en) | Verifiable Electronic Voting System | |
| Mark et al. | A secured online voting system by using blockchain as the medium | |
| CN1321507C (en) | Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism | |
| JP6031729B1 (en) | RFID tag code generation device and method, authentication device and method, and program | |
| Budurushi et al. | Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers | |
| US20090037744A1 (en) | Biometric pin block | |
| Joaquim et al. | Improving remote voting security with codevoting | |
| Clarkson | Breaking assumptions: distinguishing between seemingly identical items using cheap sensors | |
| Müller-Török et al. | Council of Europe Recommendation CM/Rec (2017) 5 and e-Voting Protocol Design | |
| Stenbro | A survey of modern electronic voting technologies | |
| Gaikwad et al. | Advanced security in 2LQR code generation and document authentication |