An Active Approach to Voting Verification
نویسندگان
چکیده
As our voting systems have come to rely more deeply on computer technology there have been great opportunities to improve the voting process, however, recently computer scientists and the general public have become wary of the amount of trust we place in the computers running our elections. Many proposals for audit systems to monitor our elections have been created. One popular audit system is the voter verified paper audit trail (VVPAT). Another more recent proposal is the voter verified audio audit transcript trail (VVAATT). In order to compare these two systems we conducted a user study where we purposely added errors to the audit trail in order to see if voters would be able to find these errors. Our results showed that voters found many more errors using the VVAATT system than they did with the VVPAT system.
منابع مشابه
An improved approach for ranking the candidates in a voting system based on efficiency intervals
This paper proposes improvements and revisions to a recent approach in a voting system, and provides an effective approach with a stronger discriminate power. For this purpose, the advantage of a linear transformation is utilized to redene a previously used concept of virtual worst candidate, by incorporating the existing weight restrictions. Then, the best score of this virtual candidate is us...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملType-Based Verification of Electronic Voting Protocols
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorous analysis quite challenging. As a matter of fact, existing automated analysis techniques, which are mostly based on automated theorem provers, are inadequate to deal with commonly used cryptographic...
متن کاملAn Effective and Optimal Fusion Rule in the Presence of Probabilistic Spectrum Sensing Data Falsification Attack
Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...
متن کاملFormal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mCRL2
Having a doubtless election in the information technology era requires satisfaction and verification of security properties in electronic voting (e-voting) systems. This paper focuses on verification of authentication-type properties of an e-voting protocol. The well-known FOO92 e-voting protocol is analyzed, as a case study, against the uniqueness and eligibility properties and their satisfact...
متن کاملA two phases approach for discriminating efficient candidate by using DEA inspired procedure
There are several methods to ranking DMUs in Data Envelopment Analysis (DEA) and candidates in voting system. This paper proposes a new two phases method based on DEA’s concepts. The first phase presents an aspiration rank for each candidate and second phase propose final ranking.
متن کامل