Главная
Study mode:
on
1
Introducción
2
INTRODUCTION TO ELECTRONIC VOTING
3
PRIVACY VS INTEGRITY
4
SECURITY VS PERFORMANCE
5
INTEGRITY VS USABILITY
6
INTEGRITY REQUIREMENTS
7
VERIFIABILITY AGAINST UNTRUSTED DEVICES
8
CAST-AS-INTENDED VERIFIABILITY
9
CHALLENGE THE SYSTEM
10
PROOF OF CORRECTNESS
11
SECOND FACTOR AUTHENTICATION
12
LOOKING FOR A BETTER SOLUTION
13
INITIAL IDEA
14
CORRUPTED DEVICE
15
ACTORS IN SECOND FACTOR CORRECTNESS
16
VALIDATION DEVICE
17
PROTOCOL OVERVIEW
18
QR CODE GENERATION
19
SFC DEVICE PROTOCOL
20
SFC CONFIRMATION
21
DEVIL IS IN THE DETAILS
22
FUTURE WORK
Description:
Explore the intricacies of electronic voting systems and second factor authentication in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the challenges of balancing privacy, integrity, security, and usability in electronic voting. Examine the concept of verifiability against untrusted devices and the importance of cast-as-intended verifiability. Learn about proof of correctness and the potential vulnerabilities in second factor authentication. Discover a novel approach to improving security through the introduction of a second factor correctness protocol. Analyze the roles of various actors in this system, including corrupted devices and validation devices. Gain insights into the QR code generation process, device protocols, and confirmation mechanisms. Conclude with a discussion on future work and potential improvements in electronic voting security.

Vote of No Confidence - Second Factor Correctness

Hack In The Box Security Conference
Add to list