Towards Secure Quadratic Voting

نویسندگان

  • Sunoo Park
  • Ronald L. Rivest
چکیده

We provide an overview of some of the security issues involved in securely implementing Lalley and Weyl’s “Quadratic Voting” [37], and suggest some possible implementation architectures. Our proposals blend “end-to-end verifiable” voting methods with anonymous payments. We also consider new refund rules for quadratic voting, such as a “lottery” method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Practical and Secure Coercion-Resistant Scheme for Internet Voting

Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show tha...

متن کامل

Towards Remote E-Voting: Estonian case

This paper gives an overview about the Estonian e-voting system. Paper discusses how the concept of e-voting system is designed to resist some of the main challenges of remote e-voting: secure voters authentication, assurance of privacy of voters, giving the possibility of re-vote, and how an e-voting system can be made comprehensible to build the public trust.

متن کامل

Experimentation on Secure Internet Voting in Spain

A major step forward along the path towards the implementation of secure Internet voting in Spain was taken in November 2003. For the first time in this country, a non-binding remote electronic voting pilot was run in parallel to a public election, in particular the 2003 election to the Parliament of Catalonia. The e-voting pilot was also the first of this kind to gain the requisite approval by...

متن کامل

Towards Practical and Secure Coercion-Resistant Electronic Elections

Coercion-resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately, their scheme has a quadratic complexity (the overhead for tallying authorities is quadratic in the number of votes) ...

متن کامل

Towards the impact of the operational environment on the security of e-voting

Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was focused on secure e-voting protocols. We show that the security of electronic elections requires a secure operational environment as well. We provide a comprehensive catalogue of organizational and technical requirements which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016