43,736 research outputs found

    Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

    Full text link
    Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum's work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make - especially if the mail system cannot be trusted. When conspiring with the recipient of the cast ballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. This emphasizes the importance of using: (1) Unconditional security for secure network communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption in code voting. We use PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod10\mod 10 addition correctly with a 99\% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems. Given that end users of our proposed voting scheme construction are humans we \emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving: \begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure against a tt-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade the threat of malware. \end{enumerate} We do not focus on active adversaries

    Distributed Protocols at the Rescue for Trustworthy Online Voting

    Get PDF
    While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustworthy online voting protocols and recall therefore their security concepts with its trust assumptions. Inspired by the Bitcoin protocol, the prospects of distributed online voting protocols are analysed. No trusted authority is assumed to ensure ballot secrecy. Further, the integrity of the voting is enforced by all voters themselves and without a weakest link, the protocol becomes more robust. We introduce a taxonomy of notions of distribution in online voting protocols that we apply on selected online voting protocols. Accordingly, blockchain-based protocols seem to be promising for online voting due to their similarity with paper-based protocols

    Regulating impartiality: Electoral-boundary politics in the administrative arena

    Get PDF

    Diasporas and democratization in the post-communist world

    Get PDF
    If diaspora communities are socialized with democratic values in Western societies, they could be expected to be sympathetic to the democratization of their home countries. However, there is a high degree of variation in their behavior. Contrary to the predominant understanding in the literature that diasporas act in exclusively nationalist ways, this article argues that they do engage with the democratization of their home countries. Various challenges to the sovereignty of their homelands explain whether diasporas involve with procedural or liberal aspects of democratization. Drawing evidence from the activities of the Ukrainian, Serbian, Albanian and Armenian diasporas after the end of communism, I argue that unless diasporas are linked to home countries that enjoy both international legal and domestic sovereignty, they will involve only with procedural aspects of democratization. Diasporas filter international pressure to democratize post-communist societies by utilizing democratic procedures to advance unresolved nationalist goals

    Democratic dawn? : Civil society and elections in Myanmar 2010 – 2012

    Get PDF
    While the general elections in Myanmar in November 2010 were widely condemned, both national and international actors approached the by-elections of April 2012 as a political rite-de-passage to improve relations between the government and the opposition inside, and between the former pariah state and the international community outside the country. An undercurrent to the government-led transition process from an authoritarian to a formally more democratic regime was the development of a politically oriented civil society that found ways to engage in the electoral process. This article describes the emerging spaces of election-related civil society activism in the forms of civic and voter education, national election observation, and election-related agency in the media. Noting that, in particular, election observation offers connections for civil society to regional and international debates, the paper draws preliminary conclusions about further developments ahead of the general elections in Myanmar expected for 2015

    Vote-Buying and Reciprocity

    Get PDF
    While vote-buying is common, little is known about how politicians determine who to target. We argue that vote-buying can be sustained by an internalized norm of reciprocity. Receiving money engenders feelings of obligation. Combining survey data on vote-buying with an experiment-based measure of reciprocity, we show that politicians target reciprocal individuals. Overall, our findings highlight the importance of social preferences in determining political behavior.vote-buying, reciprocity, redistributive politics, voting, social preferences

    Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture

    Get PDF
    The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures. The author spends a large majority of the paper delineating China’s Internet infrastructure and prevalent Internet Censorship Technologies/Techniques (ICTs), paying particular attention to how the ICTs function at a technical level. The author further analyzes the state of Internet Censorship in both Iran and Russia from a broader perspective to give a better understanding of Internet Censorship around the globe. The author also highlights specific CTs, explaining how they function at a technical level. Findings indicate that among all three nation-states, state control of Internet Service Providers is the backbone of Internet Censorship. Specifically, within China, it is discovered that the infrastructure functions as an Intranet, thereby creating a closed system. Further, BGP Hijacking, DNS Poisoning, and TCP RST attacks are analyzed to understand their use-case within China. It is found that Iran functions much like a weaker version of China in regards to ICTs, with the state seemingly using the ICT of Bandwidth Throttling rather consistently. Russia’s approach to Internet censorship, in stark contrast to Iran and China, is found to rely mostly on the legislative system and fear to implement censorship, though their technical level of ICT implementation grows daily. TOR, VPNs, and Proxy Servers are all analyzed and found to be robust CTs. Drawing primarily from the examples given throughout the paper, the author highlights the various effects of Internet Censorship on culture – noting that at its core, Internet Censorship destroys democracy

    Occupy Wall Street: The movement in its third anniversary

    Get PDF
    Peer-reviewedThe emergence of networked social movements in 2011 has opened a new door in the social movements' literature. By adopting a technopolitical and situated approach, in this paper, we explore the case of the Occupy Wall Street movement three years after its formation in September 2011. Through an online survey and a nonprobabilistic sampling procedure, we pay special attention to the perceptions and opinions of the movement's participants. We distinguish seven thematic sections: the relationship with the movement, previous political participation and motivations, the use of information and communication technologies (ICTs), the emotions experienced, the evolution of the movement, its influence on institutional politics, and its impacts on several aspects of social life. The results show that the respondents (N=522) are overall adherent to the movement and that the majority participated at some point. Most think that the movement still exists in one way or another, and perceive its impact on several areas, institutions, behaviours, and ideas. We conclude by describing OWS as a case that adequately fits the concept of a networked social movement. Finally, we suggest further developments in the understanding of these movements by further applying the online survey designed for this study and complementing analyses via other research methods.La aparición de los movimientos sociales en red en 2011 ha abierto una nueva puerta en la literatura de los movimientos sociales. Al adoptar un enfoque tecnopolítico y situado, en este documento, exploramos el caso del movimiento Occupy Wall Street tres años después de su creación en septiembre de 2011. A través de una encuesta en línea y un procedimiento de muestreo no probabilístico, prestamos especial atención a las percepciones y opiniones de los participantes del movimiento. Distinguimos siete secciones temáticas: la relación con el movimiento, la participación y motivaciones políticas previas, el uso de las tecnologías de información y comunicación (TIC), las emociones experimentadas, la evolución del movimiento, su influencia en la política institucional y sus impactos en varios aspectos de la vida social. Los resultados muestran que los encuestados (N = 522) se adhieren en general al movimiento y que la mayoría participó en algún momento. La mayoría piensa que el movimiento todavía existe de una forma u otra, y perciben su impacto en varias áreas, instituciones, comportamientos e ideas. Concluimos describiendo OWS como un caso que encaja adecuadamente con el concepto de un movimiento social en red. Finalmente, sugerimos desarrollos adicionales en la comprensión de estos movimientos mediante la aplicación de la encuesta en línea diseñada para este estudio y complementando los análisis a través de otros métodos de investigación.L'aparició dels moviments socials en xarxa en 2011 ha obert una nova porta en la literatura dels moviments socials. En adoptar un enfocament tecnopolítico i situat, en aquest document, explorem el cas del moviment Occupy Wall Street tres anys després de la seva creació al setembre de 2011. A través d'una enquesta en línia i un procediment de mostreig no probabilístic, prestem especial atenció a les percepcions i opinions dels participants del moviment. Distingim set seccions temàtiques: la relació amb el moviment, la participació i motivacions polítiques prèvies, l'ús de les tecnologies d'informació i comunicació (TIC), les emocions experimentades, l'evolució del moviment, la seva influència en la política institucional i els seus impactes en diversos aspectes de la vida social. Els resultats mostren que els enquestats (N = 522) s'adhereixen en general al moviment i que la majoria va participar en algun moment. La majoria pensa que el moviment encara existeix d'una forma o una altra, i perceben el seu impacte a diverses àrees, institucions, comportaments i idees. Concloem descrivint OWS com un cas que encaixa adequadament amb el concepte d'un moviment social en xarxa. Finalment, suggerim desenvolupaments addicionals en la comprensió d'aquests moviments mitjançant l'aplicació de l'enquesta en línia dissenyada per a aquest estudi i complementant les anàlisis a través d'altres mètodes de recerca
    corecore