362 research outputs found

    A Fast Cryptographic Protocol for Anonymous Voting

    Get PDF
    In this work, we discuss the problem of electronic voting. This notion has become widely sought in the world, which justifies the efforts made by researchers in this field. Voting by electronic means does not facilitate the task only for the organizers, but also for the voters who can send their choices from the home. Our system of binary electronic voting is based on Paillier cryptosystem. We chose this protocol as it is an additive homomorphism which will facilitate the calculation of the final vote results. The method presents a great difficulty in the decryption for attackers as it is based on the problem of factoring large numbers.   The protocol that we propose guarantees the anonymity of the vote, i.e. no one should know the vote of an elector. We also worked on the control of the parties holding the ballot. This increases the security, reliability and integrity of the vote. We have introduced several cryptographic notions to create an effective scheme

    A secure electronic voting scheme

    Get PDF
    In this paper a new electronic voting scheme is described which guarantees coercion-resistance as well as privacy, eligibility, unreusability and verifiability. The proposed protocol can be implemented in practical environment, since it does not require untappable channel or voting booth, only anonymous channels are applied

    HandiVote: simple, anonymous, and auditable electronic voting

    Get PDF
    We suggest a set of procedures utilising a range of technologies by which a major democratic deļ¬cit of modern society can be addressed. The mechanism, whilst it makes limited use of cryptographic techniques in the background, is based around objects and procedures with which voters are currently familiar. We believe that this holds considerable potential for the extension of democratic participation and control

    The SAVE System: Secure Architecture for Voting Electronically: Existing Technology, with Built-in Redundancy, Enables Reliability

    Get PDF
    Existing technology is capable of yielding secure, reliable, and auditable voting systems. This system outlines an architecture based on redundancy at each stage of the ballot submission process that is resistant to external hacking and internal insertion of malicious code. The proposed architecture addresses all layers of the system beyond the point when a voter commits the ballot. These steps include the verification of eligibility to vote, authentication, and aggregation of the vote. A redundant electronic audit trail keeps track of all of the votes and messages received, rendering a physical paper trail unnecessary. There is no single point of failure in the system, as none of the components at a particular layer relies on any of the others; nor is there a single component that decides what tally is correct. Each system arrives at the result on its own. Programming time for implementation is minimal. The proposed architecture was written in Java in a short time. A second programmer was able to write a module in less than a week. Performance and reliability are incrementally improvable by separate programmers writing new redundant modules

    Eligibility Veriability in Untrustworthy Voting Environments

    Get PDF

    E-voting: an immature technology in a critical context

    Get PDF
    E-voting has been introduced prematurely to national elections in many countries worldwide. There are technical and organizational barriers which must be resolved before the use of e-voting can be recommended in such a critical context. Two fundamental requirements for e-voting systems are in con ict: ballot-secrecy and accuracy. We describe the nature and implications of this conflict, and examine the two main categories of proposed solutions: cryptographic voting schemes, and Voter Veried Audit Trails (VVATs). The conflict may permanently rule out the use of remote e-voting for critical elections, especially when one considers that there is no known way to reproduce the enforced privacy of a voting booth outside the supervision of a polling station. We then examine the difficulty faced by governments when they procure Information and Communication Technology (ICT) systems in general, and some mitigation strategies. We go on to describe some legal implications of the introduction of e-voting, which could have serious consequences if not adequately explored, and discuss the evaluation and maintenance of systems. In the final chapters we explore two approaches to the development of requirements for e-voting
    • ā€¦
    corecore