Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Securing an Electronic Legislature Using Threshold Signatures

View through CrossRef
Today a significant amount of research has focused on trying to apply the advances in information technology to governmental services. One endeavor has been the attempt to apply it to “electronic voting.” Unfortunately, while questionable secure e-voting technology has been widely deployed, the same cannot be said for cryptographic based ones. There is one type of “voting” which has received only limited attention concerning applying these technology advances, the type of voting that takes place within a legislative body. At first glance, it may not appear difficult to institute electronic voting in a legislature, for it may seem that one only needs to apply the traditional security mechanisms that are used to safeguard networked systems, but as we soon outline there will be significant security risks associated with an electronic legislature. One of our concerns is that entities may attempt to implement an electronic version of a legislature without realizing all the risks and implementing all the needed security mechanisms. In fact, there have been occasional instances of some entities attempting to create some electronic/digital form of legislature, for example (Weidenbener, 2004). In any legislative vote, the legislature’s ability to pass or to not pass legislation should be interpreted as the legislature deciding whether to “sign the proposal” into “law.” Thus, “law” is a signature; anyone can verify that a “proposal” is a “law” by applying the signature verification procedure. As we move towards electronic applications of governmental services, it is only natural when this is applied towards legislatures we will replace the “written law” by a “digital signature” (here the use of the term law can be replaced by any internal regulation and a legislature by any regulatory body). The underlying aspect of the article is the security considerations that need to be applied when this is implemented. The question why consider an electronic legislature is important. The fundamental reasons for applying today’s information technology to government and its services have always focused on that it would bring improved services and allow greater accessibility of government to its constituents. An electronic legislature would most certainly improve the legislative service. It will allow for the legislators to be mobile, they will no longer need to be tied to the legislative house to provide representation. Many industrial employers allow their workers to telecommute to work, it is a realization by the employers that these workers are valuable, as well as a recognition that the workforce and the time constraints on the workforce has changed. In many cases, without this option, these workers may leave the workplace. This same reasoning of a valued worker should be applied to our legislators. Further, it does not make sense that today we would allow a subset of the legislature to make and pass laws due to absenteeism, especially in light that many of the required mechanisms to bring about a mobile “electronic legislature” are available. One can argue that by allowing legislators to occasionally telecommute will provide an improved workforce (this argument is motivated by the same reason that private industry utilizes “telecommuting”). We also observe that an electronic legislature should provide the constituents greater access to their legislators. A final argument for an electronic legislature is that it will provide continuation of government in the case of some drastic action like a terrorist attack. In the fall of 2001, the legislative branch of the U.S. federal government came under two attacks. The first attack was performed by Al Qaeda operatives (who it is speculated intended to fly one of the planes into the U.S. capital), and a second attack by an unknown entity who contaminated parts of the U.S. senate (and it offices) with anthrax spores. This second attack was successful in that it denied the Senate the ability to convene for several days. Although such terrorist’s attacks on the legislative branch may appear novel, at least in the U.S., such attacks have been precipitated in other countries for some years (PBS, 2001). The U.S. government has recognized the need to develop a means for the continuity of government in the wake of such disasters (Continuity of Government Commission, 2002), one such solution is to utilize an e-legislature.
Title: Securing an Electronic Legislature Using Threshold Signatures
Description:
Today a significant amount of research has focused on trying to apply the advances in information technology to governmental services.
One endeavor has been the attempt to apply it to “electronic voting.
” Unfortunately, while questionable secure e-voting technology has been widely deployed, the same cannot be said for cryptographic based ones.
There is one type of “voting” which has received only limited attention concerning applying these technology advances, the type of voting that takes place within a legislative body.
At first glance, it may not appear difficult to institute electronic voting in a legislature, for it may seem that one only needs to apply the traditional security mechanisms that are used to safeguard networked systems, but as we soon outline there will be significant security risks associated with an electronic legislature.
One of our concerns is that entities may attempt to implement an electronic version of a legislature without realizing all the risks and implementing all the needed security mechanisms.
In fact, there have been occasional instances of some entities attempting to create some electronic/digital form of legislature, for example (Weidenbener, 2004).
In any legislative vote, the legislature’s ability to pass or to not pass legislation should be interpreted as the legislature deciding whether to “sign the proposal” into “law.
” Thus, “law” is a signature; anyone can verify that a “proposal” is a “law” by applying the signature verification procedure.
As we move towards electronic applications of governmental services, it is only natural when this is applied towards legislatures we will replace the “written law” by a “digital signature” (here the use of the term law can be replaced by any internal regulation and a legislature by any regulatory body).
The underlying aspect of the article is the security considerations that need to be applied when this is implemented.
The question why consider an electronic legislature is important.
The fundamental reasons for applying today’s information technology to government and its services have always focused on that it would bring improved services and allow greater accessibility of government to its constituents.
An electronic legislature would most certainly improve the legislative service.
It will allow for the legislators to be mobile, they will no longer need to be tied to the legislative house to provide representation.
Many industrial employers allow their workers to telecommute to work, it is a realization by the employers that these workers are valuable, as well as a recognition that the workforce and the time constraints on the workforce has changed.
In many cases, without this option, these workers may leave the workplace.
This same reasoning of a valued worker should be applied to our legislators.
Further, it does not make sense that today we would allow a subset of the legislature to make and pass laws due to absenteeism, especially in light that many of the required mechanisms to bring about a mobile “electronic legislature” are available.
One can argue that by allowing legislators to occasionally telecommute will provide an improved workforce (this argument is motivated by the same reason that private industry utilizes “telecommuting”).
We also observe that an electronic legislature should provide the constituents greater access to their legislators.
A final argument for an electronic legislature is that it will provide continuation of government in the case of some drastic action like a terrorist attack.
In the fall of 2001, the legislative branch of the U.
S.
federal government came under two attacks.
The first attack was performed by Al Qaeda operatives (who it is speculated intended to fly one of the planes into the U.
S.
capital), and a second attack by an unknown entity who contaminated parts of the U.
S.
senate (and it offices) with anthrax spores.
This second attack was successful in that it denied the Senate the ability to convene for several days.
Although such terrorist’s attacks on the legislative branch may appear novel, at least in the U.
S.
, such attacks have been precipitated in other countries for some years (PBS, 2001).
The U.
S.
government has recognized the need to develop a means for the continuity of government in the wake of such disasters (Continuity of Government Commission, 2002), one such solution is to utilize an e-legislature.

Related Results

Manual and Machine Learning Approaches for Classifying Real and Forged Signatures—A Comparative Study and Forensic Implications
Manual and Machine Learning Approaches for Classifying Real and Forged Signatures—A Comparative Study and Forensic Implications
ABSTRACTA handwritten signature is one of the forms of a biometric measure that creates an individual identity of the persons to mark their approval related to any document. The ma...
Analysis of the Cross-Study Replicability of Tuberculosis Gene Signatures Using 49 Curated Transcriptomic Datasets
Analysis of the Cross-Study Replicability of Tuberculosis Gene Signatures Using 49 Curated Transcriptomic Datasets
Background Tuberculosis (TB) is the leading cause of infectious disease mortality worldwide. Numerous blood-based gene expression signatures have been proposed in...
Prinsip Jaminan Hukum Sebagai Jaminan Sertifikasi Tanda Tangan Elektronik
Prinsip Jaminan Hukum Sebagai Jaminan Sertifikasi Tanda Tangan Elektronik
Technological developments by international organizations see the need for recognition and regulation of legal certainty in the field of information technology, regarding electroni...
Correlation of Mutational Signatures in Cancer Genes with General Signatures
Correlation of Mutational Signatures in Cancer Genes with General Signatures
The occurrence of various mutation patterns, such as changes in the DNA sequence and the loss of some sequences, is called a “mutational signature,” and they represent the molecula...
Public Law in the State Courts in 1925–1926
Public Law in the State Courts in 1925–1926
Validity of Procedure. In the summer of 1925 the appellate division of the supreme court of New York held that the City Home Rule Amendment of 1923 had not been legally adopted and...
Notes on Threshold EdDSA/Schnorr Signatures
Notes on Threshold EdDSA/Schnorr Signatures
This report considers threshold signature schemes interchangeable with respect to the verification mechanism of the Edwards-Curve Digital Signature Algorithm (EdDSA). Historically,...
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
Abstract As permeability of tight oil reservoir is generally less than 0.1md, diameters of pore throats are primarily at the micrometer- and nanometer-scale. Differe...

Back to Top