1,103 research outputs found

    A framework for comparing the security of voting schemes

    Get PDF
    We present a new framework to evaluate the security of voting schemes. We utilize the framework to compare a wide range of voting schemes, including practical schemes in realworld use and academic schemes with interesting theoretical properties. In the end we present our results in a neat comparison table. We strive to be unambiguous: we specify our threat model, assumptions and scope, we give definitions to the terms that we use, we explain every conclusion that we draw, and we make an effort to describe complex ideas in as simple terms as possible. We attempt to consolidate all important security properties from literature into a coherent framework. These properties are intended to curtail vote-buying and coercion, promote verifiability and dispute resolution, and prevent denial-of-service attacks. Our framework may be considered novel in that trust assumptions are an output of the framework, not an input. This means that our framework answers questions such as ”how many authorities have to collude in order to violate ballot secrecy in the Finnish paper voting scheme?

    Electronic Voting

    Get PDF
    This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others

    Electronic Voting

    Get PDF
    This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others

    Beyond box-ticking:a study of stakeholder involvement in social enterprise governance

    Get PDF
    Purpose – This paper aims to present the findings from a small study of social enterprise governance in the UK, taking a case study approach to uncover the experiences of internal actors who are involved in their board-level management. Design/methodology/approach – The study took a qualitative constructionist approach, focusing on stakeholder involvement in social enterprise governance. Initial theme analysis of 14 semi-structured interviews with board or senior management representatives revealed key issues in the governance of social enterprise, which were then explored through a comparative case study of two organisations. Findings – The study found that social enterprises surveyed employed a number of mechanisms to ensure appropriate stakeholder involvement in their governance, including adopting a participatory democratic structure which involves one or more groups of stakeholders, creation of a non-executive advisory group to inform strategic direction and adopting social accounting with external auditing. The research also highlighted the potential of the community interest company legal form for UK social enterprise, particularly in developing the role of the asset-locked body in terms of providing CIC governance oversight. Research limitations/implications – This survey was limited to the North West of England; however its findings can potentially support innovation in conceptual developments internationally. Originality/value – This research contributes to the under-researched field of social enterprise governance, potentially enabling these organisations to adopt more effective governance mechanisms that appropriately manage the involvement of beneficiaries and other stakeholders

    La volonté machinale: understanding the electronic voting controversy

    Get PDF
    Contains fulltext : 32048_voloma.pdf (publisher's version ) (Open Access)Radboud Universiteit Nijmegen, 21 januari 2008Promotor : Jacobs, B.P.F. Co-promotores : Poll, E., Becker, M.226 p

    Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections

    Get PDF
    End-to-end verifiable election systems (E2E systems) provide a provably correct tally while maintaining the secrecy of each voter's ballot, even if the voter is complicit in demonstrating how they voted. Providing voter incoercibility is one of the main challenges of designing E2E systems, particularly in the case of internet voting. A second challenge is building deployable, human-voteable E2E systems that conform to election laws and conventions. This dissertation examines deployability, coercion-resistance, and their intersection in election systems. In the course of this study, we introduce three new election systems, (Scantegrity, Eperio, and Selections), report on two real-world elections using E2E systems (Punchscan and Scantegrity), and study incoercibility issues in one deployed system (Punchscan). In addition, we propose and study new practical primitives for random beacons, secret printing, and panic passwords. These are tools that can be used in an election to, respectively, generate publicly verifiable random numbers, distribute the printing of secrets between non-colluding printers, and to covertly signal duress during authentication. While developed to solve specific problems in deployable and incoercible E2E systems, these techniques may be of independent interest

    Nullification, a coercion-resistance add-on for e-voting protocols

    Get PDF
    Coercion is one of the remaining issues on internet voting. Many developing countries are prone to this problem due to lower income rate. In this study, a novel coercion-resistant protocol has been proposed that can be integrated with previously proposed e-voting systems. We call it nullification. We present it as a part of the VoteXX e-voting protocol that has been designed and implemented through this study. Nullification gives the voter a strategic advantage over the coercer. The voter can share her keys with a trusted proxy, called a nullifier, for later flipping that vote. Integrity and ballot secrecy are provided simultaneously through the use of zero-knowledge proofs, specifically ÎŁ-protocols. We show how our approach is different from (and potentially composable with) re-voting or panic password techniques that have been previously proposed in the academic literature. Through designing this protocol, we solve several issues, design new ÎŁ-protocols and protocols for the secure evaluation of basic logic functions like exclusive-or (xor) under encryption: True XOR and Online XOR have been proposed that improves the previously proposed Mix and Match protocol for secure multi-party computation of an arbitrary function under constrained input domain

    The impact of blockchain technology on the trustworthiness of online voting systems - an exploration of blockchain-enabled online voting

    Get PDF
    Online Voting evidently increases election turnouts. However, recent state-owned initiatives have failed due to security concerns and a lack of trust in the systems. Block chain seems to be a very suitable technical solution to establish transparency in online voting and thus, create trust. We have built our own, block chain-enabled voting platform and utilized it to run an A/B-testing experiment at an university election to investigate its effect. Our results which show that students trusted the block chain-based voting version less than the control version can be found in Vysna (2020). The following discussion can be found in Konzok (2020
    • …
    corecore