An Overview of Electronic Voting and Security
نویسنده
چکیده
The author of this note has been accused of being a computer scientist, never an election official. Thus, this paper provides a discussion of various requirements to illustrate how one would determine desirable qualities. Election officials will have their own perspective, honed by experience, of the importance of these requirements, and can weigh them appropriately. Some seem universal; others may apply only under specific circumstances.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کامل11 Electronic Voting : Developments , Trends , Challenges
This paper hopefully contributes to the discussion on what kind of electronic voting systems utilizing Internet technology we should be aiming at and what characteristics these systems should have. It provides an overview of the major constitutional and legal aspects of e-voting, together with their technical implications. It also discusses the security requirements and the system-wide properti...
متن کاملAnalysis of Electronic Voting System in Various Countries
India is the world’s largest democracy with a population of more than 1 billion; India has an electorate of more than 668 million and covers 543 parliamentary constituencies. Voting is the bridge between the governed and government. The last few years have brought a renewed focus on to the technology used in the voting process. The current voting system has many security holes, and it is diffic...
متن کاملSecure Electronic Voting Protocols
This chapter gives a summary of cryptographic e-voting protocols. We start with a motivation and an overview of some aspects of traditional elections. We then outline the security requirements of e-voting and present in detail two approaches to cryptographic e-voting, based on homomorphic encryption and mix networks. We finish the chapter with a list of open problems.
متن کاملMobile Based E-democracy: the Ibb/pma E-voting System
In the field of electronic democracy, significant part of the research activity focuses on the ability to conduct secure and trustworthy electronic election procedures. This paper presents the extension prototype of an electronic voting system, called IBB/PMA Electronic Voting System that enables cellular phones and mobile devices to act as voting casting devices. The system takes into consider...
متن کاملVerifiability in Electronic Voting - Explanations for Non Security Experts
Scientists have requested verifiable electronic voting schemes for many years. These schemes offer individual and universal verifiability by applying and combining complex cryptographic primitives and protocols. Electronic voting systems in use provide less or even no verifiability. Thus election authorities and voters need to trust the provider and developer of the voting system regarding the ...
متن کامل