The Certification of E-Voting Mechanisms. Fighting against Opacity
نویسنده
چکیده
Many countries are using certification procedures to guarantee the full compliance of e-voting mechanisms with democratic standards, but the data generated by these analysis is normally handled almost secretly. Given that transparency is a key principle to guarantee citizen's confidence in the electoral process, this opacity would only be acceptable after a correct balance of the concurrent interests. The paper provides specific data on the certification mechanisms of some countries and assesses the feasibility of a disclosure of the certification reports.
منابع مشابه
Random Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملTesting Democracy: How Independent Testing of E-Voting Systems Safeguards Electoral Integrity
When properly implemented, electronic election systems provide accurate vote counting, timely transmission of results, and secure electoral processes. Independent testing and certification by qualified testing laboratories offer election administrators, election stakeholders, and the public assurance that e-voting systems are trustworthy. Testing is an essential tool to safeguard the integrity ...
متن کاملSecure E-voting Using Homomorphic Technology
Voting is one of the most important activities in a democratic society. In a traditional voting environment voting process sometimes becomes quite inconvenient due to the reluctance of certain voters to visit a polling booth to cast votes besides involving huge social and human resources. The development of computer networks and elaboration of cryptographic techniques facilitate the implementat...
متن کاملEarl Barr , Matt Bishop , and Mark Gondree Fixing Federal E - Voting Standards Without a threat model and a system model , voting standards cannot ensure
n elections throughout the U.S., electronic voting machines have failed to boot, tallied 10 times as many votes as registered voters, and drawn criticism from academics, election officials, and concerned citizens alike. High-profile exploits (such as the Hursti attack [4] and the Princeton group’s Diebold virus [2]) have brought media attention to the fragility just below the surface of electro...
متن کاملOpacity and Abstractions
The opacity property characterises the absence of confidential information flow towards inquisitive attackers. Verifying opacity is well established for finite automata but is known to be not decidable for more expressive models like Turing machines or Petri nets. As a consequence, for a system dealing with confidential information, formally certifying its confidentiality may be impossible, but...
متن کامل