39 research outputs found

    Building a Multimodal, Trust-Based E-Voting System

    Get PDF
    This paper addresses the issue of voter identification and authentication, voter participation and trust in the electoral system. A multimodal/hybrid identification and authentication scheme is proposed which captures what a voter knows – PIN, what he has – smartcard and what he is – biometrics. Massive participation of voters in and out of the country of origin was enhanced through an integrated channel (kiosk and internet voting). A multi-trust voting system is built based on service oriented architecture. Microsoft Visual C#.Net, ASP.Net and Microsoft SQL Server 2005 Express Edition components of Microsoft Visual Studio 2008 was used to realize the Windows and Web-based solutions for the electronic voting system

    Secured and Auditable Cryptography for Electronic Voting

    Get PDF
    Dengan adanya Electronic Voting (e-voting) diharapkan dapat menggantikan sistem pemungutan suara konvensional yang telah ada sebelumnya. Pada sistem e-voting ini menggunakan konsep Pret a Voter yang menggunakan skema paper ballot e-voting. Skema ini menggunakan Public Key Infrastructure (PKI). Skema yang diusulkan menggunakan paper ballot e-voting dengan pertimbangan telah popular di kalangan masyarakat, tetapi didukung oleh protokol enkripsi yang kuat untuk menjamin vote secrecy dan anonymity dari pemilih. Aspek verifiability dari suatu system e-voting juga merupakan hal fundamental. Sistem e-voting menggunakan system protocol mixnets dengan kompleksitas security cukup baik.

    Security analysis of a "Location-stamping" protocol for GPS coordinates

    Get PDF
    Due to the rapid growth of GNSS based techniques in everyday life a service which can provide certified location information given by GPS coordinates became a worth considering idea. We designed two protocols that can  achieve this goal, these can provide authenticate location and time information for any device which has a GPS receiver. In this article, I would like to prove -with the help of ProVerif software tool-, the latter statement. I investigated the authenticity and data integrity properties of the protocol

    Electronic Voting Service Using Block-Chain

    Get PDF
    Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identify information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain is open to the public. These characteristics are the same as the requirements for a voting system. That is, strong robustness, anonymity, and transparency. In this paper, we propose an electronic voting system as an application of block-chain, and describe block-chain based voting at a national level through examples

    Public Evidence from Secret Ballots

    Full text link
    Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordable and maintainable, and usable by voters, election officials, and pollworkers. It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics. Election integrity involves two key concepts: convincing evidence that outcomes are correct and privacy, which amounts to convincing assurance that there is no evidence about how any given person voted. These are obviously in tension. We examine how current systems walk this tightrope.Comment: To appear in E-Vote-Id '1

    A service-oriented architecture for robust e-voting

    Get PDF
    corecore