STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
نویسندگان
چکیده
Susan Bell, Office of the Travis County Clerk Josh Benaloh, Microsoft Research Michael D. Byrne, Rice University Dana DeBeauvoir, Office of the Travis County Clerk Bryce Eakin, independent researcher Gail Fisher, Office of the Travis County Clerk Philip Kortum, Rice University Neal McBurnett, ElectionAudits Julian Montoya, Office of the Travis County Clerk Michelle Parker, Office of the Travis County Clerk Olivier Pereira, Université catholique de Louvain Philip B. Stark, University of California, Berkeley Dan S. Wallach, Rice University Michael Winn, Office of the Travis County Clerk
منابع مشابه
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we propose a transparent, auditable, stepwise verifiable, viewable, and mutual restraining e-voting protocol that exploits the existing multi-party political d...
متن کاملDouglas Jones on Today's Voting Machines
Douglas Jones, a professor in the Computer Science Department at the University of Iowa, has been involved in voting technology research since 1995 and was a principal investigator for the National Science Foundation (NSF)-funded ACCURATE project (A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections; accurate-voting.org). His recent book with coauthor Barbara Simon, Brok...
متن کاملTHE SAVE SYSTEM: SECURE ARCHITECTURE FOR VOTING ELECTRONICALLY Existing Technology, with Built-in Redundancy, Enables Reliability
Existing technology is capable of yielding secure, reliable, and auditable voting systems. This system outlines an architecture based on redundancy at each stage of the ballot submission process that is resistant to external hacking and internal insertion of malicious code. The proposed architecture addresses all layers of the system beyond the point when a voter commits the ballot. These steps...
متن کاملInternet Voting, Security, and Privacy
Internet voting is an appealing concept to most voters, primarily for reasons of convenience (“why can’t I vote in my pajamas at a convenient time”), while appealing because of the attractiveness of technology. However, Internet voting is fundamentally different from other types of online transactions such as banking or shopping. In this Article, I describe different types of Internet voting, t...
متن کاملUndervote and Pattern Voting: Vulnerability and a mitigation technique
Highly secure and auditable voting systems have been developed recently that open up the possibility of not only voting systems that claim to be secure, but ones that can actually be verified as secure and audited to the satisfaction of third party observers. Yet, these systems are still in development and do not yet handle all of the cases that arise in real-world elections. This extended abst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1211.1904 شماره
صفحات -
تاریخ انتشار 2013