133,644 research outputs found

    Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

    Full text link
    The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been able to cast a fully secret ballot in a verifiable way, and the first time a verifiable voting system has been used to collect remote votes in a political election. The code is open source, and the output from the election is verifiable. The system took 1121 votes from these particular groups, an increase on 2010 and with fewer polling places

    Making a Case for e-Voting in Nigeria

    Get PDF
    The challenge of developing an acceptable voting system that can reduce the manipulation and falsification of election results has been a major issue in Nigeria over the decades. The consequences of the perception of voting fraud have led to social upheavals with negative implication for the polity. Post election experiences, such as eruption of violence, prolonged litigation and sometimes culminating in the collapse of the democratic experiment, have informed the muting of ideas to create a leak prove voting system to surmount the challenges of electoral manipulation. The open ballot system was adopted in the Third Republic to reduce incidences of election rigging associated with the secret ballot system which was in use before then. This was modified and used to conduct the aborted 1993 presidential election in Nigeria. Though most analysts saw the modified system as an improvement over the voting systems previously used in the country, the secret ballot system re-emerged in the Fourth Republic and for fifteen years has been in use with its attendant fraud-prone shortcomings. Calls for improvement informed the recommendation by the Uwaise Commission and the National Conference for adoption of electronic voting system. This paper employs secondary sources and descriptive analysis in the gathering and analysis of data respectively. Findings reveal the unsuitability for the Nigerian political environment, of the various voting systems adopted in the country, particularly, the secret and the open ballot system. It therefore advocates a faithful application of the system of electronic voting which has been found capable of eliminating the flaws of traditional voting system and enhancing the credibility of election results in the country

    Open Voting Client Architecture and Op-Ed Voting: A Novel Framework for Solving Requirement Conflicts in Secret Ballot Elections

    Get PDF
    Building voting systems for secret ballot elections has many challenges and is the subject of significant academic research efforts. These challenges come from conflicting requirements. In this paper, we introduce a novel architectural approach to voting system construction that may help satisfy conflicting requirements and increase voter satisfaction. Our design, called Open Voting Client Architecture, defines a voting system architectural approach that can harness the power of individualized voting clients. In this work, we contribute a voting system reference architecture to depict the current voting system construction and then use it to define Open Voting Client Architecture. We then detail a specific implementation called Op-Ed Voting to evaluate the security of Open Voting Client Architecture systems. We show that Op-Ed Voting, using voters\u27 personal devices in an end-to-end verifiable protocol, can potentially improve usability and accessibility for voters while also satisfying security requirements for electronic voting

    Who Counts Your Votes?

    Get PDF
    Open and fair elections are paramount to modern democracy. Although some people claim that the penciland- paper systems used in countries such as Canada and UK are still the best method of avoiding vote rigging, recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. It is a goal of this paper to describe a voting system that is secret and secure as well as verifiable and useable over an existing computer network. We have designed and implemented an electronic voting system – Verifiable E-Voting (VEV) – with an underlying protocol that secures the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes

    Proof of the possibility for a public audit of a secret internet voting system

    Get PDF
    The aim of this study is to prove the possibility of building a system of secret Internet voting, in which a full-fledged audit is available to all voters and their proxies. A full-fledged audit should be understood as such an audit, in which everything that may be in doubt is checked. The open block of servers was created using Raspberry Pi 3 Model B type minicomputers, which are widely known and well-established. On the basis of an open block of servers, a full-scale model of the system for conducting experimental voting was created and a detailed methodology for a full-fledged audit was developed. This methodology provides for two stages of the audit. In the first stage, voters or their proxies must be present near the server unit. In the second stage, they continue the audit remotely through a dedicated server without losing information about the security of their data. For practical acquaintance with this research, the possibility of experimental voting is given. The experiment can be conducted by anyone at any time through a link on the Internet. Thus, it is shown that not only with traditional secret voting technologies, a full-fledged audit is possible, thanks to which voters have no doubts about maintaining the secrecy of their votes and the honesty of the results. To conduct a full-fledged audit according to the described methodology, it is not require to involve highly qualified specialists, but school education, which is mandatory in many countries, is quite enough. The importance of the results is that the lack of a full-fledged audit of Internet voting systems is the main factor hindering the development of e-democracy. The lack of public auditing of Internet voting systems causes distrust in the possibility of using the Internet to conduct fair election

    RIES: Internet voting in action

    Get PDF
    RIES stands for Rijnland Internet Election System. It is an online voting system that was developed by one of the Dutch local authorities on water management. The system has been used twice in the fall of 2004 for in total approximately two million potential voters. In this paper we describe how this system works. Furthermore we do not only describe how the outcome of the elections can be verified but also how it has been verified by us. To conclude the paper we describe some possible points for improvement

    Public Evidence from Secret Ballots

    Full text link
    Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordable and maintainable, and usable by voters, election officials, and pollworkers. It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics. Election integrity involves two key concepts: convincing evidence that outcomes are correct and privacy, which amounts to convincing assurance that there is no evidence about how any given person voted. These are obviously in tension. We examine how current systems walk this tightrope.Comment: To appear in E-Vote-Id '1
    • …
    corecore