The Voting Booth Catherine
نویسنده
چکیده
The then-modern panopticon, in its subtle and unseen exercise of voyeurism and power, was to be sure an improvement over the crowded, stale prisons that preceded it. Which already incarcerated individual would not give up some personal freedom for such improved conditions? The same line of reasoning is used in modern surveillance systems. Just last week, in a New York Times article on Chicago’s new surveillance system, the police officer in charge, Ron Huberman, was quoted as saying "The value we gain in public safety far outweighs any perception by the community that this is Big Brother who's watching. The feedback we're getting is that people welcome this. It makes them feel safer."
منابع مشابه
Voting with unconditional privacy: CFSY for booth voting
We adapt the Cramer, Franklin, Schoenmaker and Yung internet voting protocol[12] to the booth setting. In this protocol, expressions of the form g 0g x1
متن کاملBare - Handed Electronic Voting with Pre - processing Submitted as a partial fulfillment of the requirements towards
Many electronic voting protocols assume the voter votes with some computing device. This raises the question whether a voter can trust the device he is using. Three years ago, Chaum, and independently Neff, proposed what we call bare-handed electronic voting, where voters do not need any computational power in the voting booth. Their protocols have a strong unforgeability guarantee. The price f...
متن کاملPaperless Independently-Verifiable Voting
We present a new model for polling-booth voting: the voter enters the polling booth with a computational assistant which helps her verify that her vote is correctly recorded. The assistant interacts with the voting system while the voter votes on the machine in the polling booth. We present an independentlyverifiable, coercion-resistant protocol based on this model. Unlike all other independent...
متن کاملVoting with unconditionally privacy: CFSY for booth voting
In this note we simplify the Cramer, Franklin, Schoenmaker and Yung internet voting protocol to the booth setting. In it, objects of the form g 0g x1 1 · · · g xl l (mod q) are used to define an unconditionally hiding commitment scheme. Because of their homomorphic properties they are particularly suited for voting protocols with unconditional privacy. In fact, we show that almost all existing ...
متن کاملSecure E-voting Using Homomorphic Technology
Voting is one of the most important activities in a democratic society. In a traditional voting environment voting process sometimes becomes quite inconvenient due to the reluctance of certain voters to visit a polling booth to cast votes besides involving huge social and human resources. The development of computer networks and elaboration of cryptographic techniques facilitate the implementat...
متن کامل