CodeVoting: protecting against malicious vote manipulation at the voter's PC

نویسندگان

  • Rui Joaquim
  • Carlos Ribeiro
چکیده

Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolled machine, e.g. the voter’s PC, may be infected with a virus or other malicious program that may try to change the voter’s vote without her knowledge. Here we present CodeVoting, a technique to create a secure communication channel to a smart card that prevents vote manipulation by the voter’s PC, while at the same time allows the use of any cryptographic voting protocol to cast the vote.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment

One of the major problems that prevent the widespread of Internet voting is the vulnerability of the voter’s computer. A computer connected to the Internet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possibl...

متن کامل

Improving Remote Voting Security with CodeVoting

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter’s computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and o...

متن کامل

The Swing Voter's Curse

We analyze two-candidate elections in which some voters are uncertain about the realization of a state variable that affects the utility of all voters.. We demonstrate the existence of a swing voter's curse: less informed indifferent voters strictly prefer to abstain rather than vote for either candidate even when voting is costless. The swing voter's curse leads to the equilibrium result that ...

متن کامل

Protecting a Distributed Voting Schema for Anonymous and Secure Voting Against Attacks of Malicious Partners

A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the...

متن کامل

Quantitative Marketing and Economics 2010

We present a structural model of political advertising in equilibrium. Candidates choose advertising across media markets in order to maximize the probability of winning the national election. The voter model takes the form of an aggregate random coefficients discrete choice model in which advertising affects a voter's incentive to vote for either candidate or not to vote at all. We estimate th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007