{"id":92242,"date":"2018-03-11T10:11:11","date_gmt":"2018-03-11T10:11:11","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/seguridad-en-los-procesos-de-voto-electronico-remotoregistrovotacionconsolidacion-de-resultados-y-auditoria\/"},"modified":"2018-03-11T10:11:11","modified_gmt":"2018-03-11T10:11:11","slug":"seguridad-en-los-procesos-de-voto-electronico-remotoregistrovotacionconsolidacion-de-resultados-y-auditoria","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/tecnologia-de-las-telecomunicaciones\/seguridad-en-los-procesos-de-voto-electronico-remotoregistrovotacionconsolidacion-de-resultados-y-auditoria\/","title":{"rendered":"Seguridad en los procesos de  voto electronico remoto:registro,votacion,consolidacion de resultados y auditoria"},"content":{"rendered":"<h2>Tesis doctoral de <strong> V\u00edctor Manuel Morales Rocha <\/strong><\/h2>\n<p>In the last few years, electronic means have been used to improve the efficiency of the different processes of an election as well as to automate them.   though this automation may have happened in a gradual way, its final purpose is to utilize electronic means for each process: voter registration, voter  authentication,  vote  casting,  and  tallying  and  publication  of  results.  The  usage  of  electronic  voting  systems  has  been  a  highly  controversial  issue,  especially concerning security. The difficulty  in reaching an expected level of security increases when the internet is used as the voting channel. Even  with  these difficulties,  the  internet  poses  considerable advantages and  it  is  necessary  to provide mechanisms  that  allow  this  automation  in  election  processes in a secure and reliable way.    the purpose of  this  thesis  is  to analyze  the security aspects  related  to  the different processes of an election, specifically when  those processes are  carried out by remote electronic means. Several possible security mechanisms are proposed, which focus on the processes of remote voter registration,  individual verification,  results consolidation, and auditing. Along with  its security aspect, each mechanism  takes  into account  transparency  in order  to  verify reliability. Additionally, the ease of use and the implementation are also considered.    various remote voting systems are analyzed as well as the corresponding security requirements of  those systems. The difficulty  in satisfying some of  those requirements will be described and particular attention will be paid to systems of remote electronic voting. The main  threats  that  those systems  face  are  analyzed  as well. Moreover,  a  comparative  study  of  the  different  remote  voting  systems  is  carried  out  and  a  voting  scheme,  in  order  to  implement internet voting, is proposed. The different voting cryptographic schemes are also described. Then, advantages and disadvantages of each of  them are analyzed in order to determine their feasibility to be used in a real environment.     the complexity to shape an electoral roll through remote communication means is also analyzed in this study. A remote voter registration system is  proposed in order to constitute an electoral roll in a reliable manner. This system employs cryptographic and biometric mechanisms.    an essential part of this thesis is the potential for independent voter verification. After analyzing several proposals, two schemes that include  mechanisms to allow voter verification are proposed, resulting in the possibility of verifying that votes are properly included in the election results.     additionally, a method  for consolidating  results  is presented. This method can be used  in  remote electronic voting. However,  it can also be used  in  elections that use different voting channels. In order to protect the voting results generated through each voting channel, cryptographic techniques are  employed. The voting results are also protected during their transference to the consolidation server.    finally,  several  audit  process  for  electronic  voting  systems  are  described.  An  audit mechanism  is  proposed  that  allows  verification  that  a  remote  electronic voting system is working properly;  it focuses on the detection of illegitimate votes. This mechanism is based on cryptographic techniques to  protect the votes once they have been received by the voting server.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Seguridad en los procesos de  voto electronico remoto:registro,votacion,consolidacion de resultados y auditoria<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Seguridad en los procesos de  voto electronico remoto:registro,votacion,consolidacion de resultados y auditoria <\/li>\n<li><strong>Autor:<\/strong>\u00a0 V\u00edctor Manuel Morales Rocha <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de catalunya<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 13\/03\/2009<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Miguel Soriano Ib\u00e1\u00f1ez<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: josep rafael Pegueroles vall\u00e9s <\/li>\n<li>i\u00f1aki Goirizelaia ordorika (vocal)<\/li>\n<li>Jos\u00e9 Mar\u00eda Sierra camara (vocal)<\/li>\n<li>cristina Ana G\u00f3mez  de la oliva (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de V\u00edctor Manuel Morales Rocha In the last few years, electronic means have been used to improve the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[13880,15596,2489,2535],"tags":[49208,53252,119058,190876,53254,190875],"class_list":["post-92242","post","type-post","status-publish","format-standard","hentry","category-informatica","category-politecnica-de-catalunya","category-tecnologia-de-las-telecomunicaciones","category-tecnologia-de-los-ordenadores","tag-cristina-ana-gomez-de-la-oliva","tag-inaki-goirizelaia-ordorika","tag-jose-maria-sierra-camara","tag-josep-rafael-pegueroles-valles","tag-miguel-soriano-ibanez","tag-victor-manuel-morales-rocha"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/92242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=92242"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/92242\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=92242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=92242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=92242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}