362 research outputs found
A Fast Cryptographic Protocol for Anonymous Voting
In this work, we discuss the problem of electronic voting. This notion has become widely sought in the world, which justifies the efforts made by researchers in this field. Voting by electronic means does not facilitate the task only for the organizers, but also for the voters who can send their choices from the home. Our system of binary electronic voting is based on Paillier cryptosystem. We chose this protocol as it is an additive homomorphism which will facilitate the calculation of the final vote results. The method presents a great difficulty in the decryption for attackers as it is based on the problem of factoring large numbers.
The protocol that we propose guarantees the anonymity of the vote, i.e. no one should know the vote of an elector. We also worked on the control of the parties holding the ballot. This increases the security, reliability and integrity of the vote. We have introduced several cryptographic notions to create an effective scheme
A secure electronic voting scheme
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as well as privacy, eligibility, unreusability and verifiability. The proposed protocol can be implemented in practical environment, since it does not require untappable channel or voting booth, only anonymous channels are applied
HandiVote: simple, anonymous, and auditable electronic voting
We suggest a set of procedures utilising a range of technologies by which a major democratic deļ¬cit of modern society can be addressed. The mechanism, whilst it makes limited use of cryptographic techniques in the background, is based around objects and procedures with which voters are currently familiar. We believe that this holds considerable potential for the extension of democratic participation and control
The SAVE System: Secure Architecture for Voting Electronically: Existing Technology, with Built-in Redundancy, Enables Reliability
Existing technology is capable of yielding secure, reliable, and auditable voting systems. This system outlines an architecture based on redundancy at each stage of the ballot submission process that is resistant to external hacking and internal insertion of malicious code. The proposed architecture addresses all layers of the system beyond the point when a voter commits the ballot. These steps include the verification of eligibility to vote, authentication, and aggregation of the vote. A redundant electronic audit trail keeps track of all of the votes and messages received, rendering a physical paper trail unnecessary. There is no single point of failure in the system, as none of the components at a particular layer relies on any of the others; nor is there a single component that decides what tally is correct. Each system arrives at the result on its own. Programming time for implementation is minimal. The proposed architecture was written in Java in a short time. A second programmer was able to write a module in less than a week. Performance and reliability are incrementally improvable by separate programmers writing new redundant modules
E-voting: an immature technology in a critical context
E-voting has been introduced prematurely to national elections in many countries worldwide. There are technical and organizational barriers which must be resolved before the use of e-voting can be recommended in such a critical
context.
Two fundamental requirements for e-voting systems are in con
ict: ballot-secrecy and accuracy. We describe the nature and implications of this conflict, and examine the two main categories of proposed solutions: cryptographic voting schemes, and Voter Veried Audit Trails (VVATs). The conflict may permanently rule out the use of remote e-voting for critical elections, especially when one considers that there is no known way to reproduce the enforced privacy of a voting booth outside the supervision of a polling station.
We then examine the difficulty faced by governments when they procure Information and Communication Technology (ICT) systems in general, and some mitigation strategies. We go on to describe some legal implications of the introduction of e-voting, which could have serious consequences if not adequately explored, and discuss the evaluation and maintenance of systems.
In the final chapters we explore two approaches to the development of requirements for e-voting
- ā¦