vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election
- URL: http://arxiv.org/abs/2403.05275v1
- Date: Fri, 8 Mar 2024 12:56:10 GMT
- Title: vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election
- Authors: Se Elnour and William J Buchanan and Paul Keating and Mwrwan Abubakar
and Sirag Elnour
- Abstract summary: vSPACE presents a novel approach to secure, private, and scalable elections.
It extends the TrueElect and ElectAnon protocols with the integration of AnonCreds SSI (Self-Sovereign Identity)
vSPACE integrates Distributed Ledger Technology (DLT) for immutable and certifiable audit trails.
- Score: 0.3749861135832073
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The vSPACE experimental proof-of-concept (PoC) on the TrueElect[Anon][Creds]
protocol presents a novel approach to secure, private, and scalable elections,
extending the TrueElect and ElectAnon protocols with the integration of
AnonCreds SSI (Self-Sovereign Identity). Such a protocol PoC is situated within
a Zero-Trust Architecture (ZTA) and leverages confidential computing,
continuous authentication, multi-party computation (MPC), and well-architected
framework (WAF) principles to address the challenges of cybersecurity, privacy,
and trust over IP (ToIP) protection. Employing a Kubernetes confidential
cluster within an Enterprise-Scale Landing Zone (ESLZ), vSPACE integrates
Distributed Ledger Technology (DLT) for immutable and certifiable audit trails.
The Infrastructure as Code (IaC) model ensures rapid deployment, consistent
management, and adherence to security standards, making vSPACE a future-proof
solution for digital voting systems.
Related papers
- Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.
Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - FL-DABE-BC: A Privacy-Enhanced, Decentralized Authentication, and Secure Communication for Federated Learning Framework with Decentralized Attribute-Based Encryption and Blockchain for IoT Scenarios [0.0]
This study proposes an advanced Learning (FL) framework designed to enhance data privacy and security in IoT environments.
We integrate Decentralized Attribute-Based Encryption (DABE), Homomorphic Encryption (HE), Secure Multi-Party Computation (SMPC) and technology.
Unlike traditional FL, our framework enables secure, decentralized authentication and encryption directly on IoT devices.
arXiv Detail & Related papers (2024-10-26T19:30:53Z) - FL-DECO-BC: A Privacy-Preserving, Provably Secure, and Provenance-Preserving Federated Learning Framework with Decentralized Oracles on Blockchain for VANETs [0.0]
Vehicular Ad-Hoc Networks (VANETs) hold immense potential for improving traffic safety and efficiency.
Traditional centralized approaches for machine learning in VANETs raise concerns about data privacy and security.
This paper proposes FL-DECO-BC as a novel privacy-preserving, provably secure, and provenance-preserving federated learning framework specifically designed for VANETs.
arXiv Detail & Related papers (2024-07-30T19:09:10Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - HE-DKSAP: Privacy-Preserving Stealth Address Protocol via Additively Homomorphic Encryption [15.902511928891643]
Homomorphic Encryption-based Dual-Key Stealth Address Protocol (HE-DKSAP)
This paper delves into the core principles of HE-DKSAP, highlighting its capacity to enhance privacy, scalability, and security in programmable blockchains.
arXiv Detail & Related papers (2023-12-17T12:23:49Z) - Establishing Dynamic Secure Sessions for ECQV Implicit Certificates in Embedded Systems [0.0]
We present a design that utilizes the Station to Station (STS) protocol with implicit certificates.
We show that with a slight computational increase of 20% compared to a static ECDSA key derivation, we are able to mitigate many session-related security vulnerabilities.
arXiv Detail & Related papers (2023-11-19T22:40:21Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Composable Security of Distributed Symmetric Key Establishment Protocol [4.806505912512235]
We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer.
As DSKE is scalable in a network setting with no distance limit, it is expected to be a cost-effective quantum-safe solution to safeguarding the network security against the threat of quantum computers.
arXiv Detail & Related papers (2023-04-26T19:14:52Z) - Model Barrier: A Compact Un-Transferable Isolation Domain for Model
Intellectual Property Protection [52.08301776698373]
We propose a novel approach called Compact Un-Transferable Isolation Domain (CUTI-domain)
CUTI-domain acts as a barrier to block illegal transfers from authorized to unauthorized domains.
We show that CUTI-domain can be easily implemented as a plug-and-play module with different backbones.
arXiv Detail & Related papers (2023-03-20T13:07:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.