Secure e-Voting for Preferential Elections
نویسندگان
چکیده
Electronic voting (e-voting) systems can greatly enhance the efficiency, and potentially, the transparency of national elections. However, the security of such systems is an area of on-going research. The literature for secure e-voting is predominantly concerned with 1-out-of-m voting strategies, where m is the number of candidates running for the elections. This paper presents a case study of cryptologic protocols for secure e-voting systems that use preferential voting strategies.
منابع مشابه
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
Numerous methods have been proposed to conduct cryptographically secure elections. Most of these protocols focus on 1-out-of-n voting schemes. Few protocols have been devised for preferential voting systems, in which voters provide a list of rankings of the candidates, and many of those treat ballots as if they were ballots in a 1-out-of-n voting scheme. We propose a linked-list-based scheme th...
متن کاملSecure and Practical Online Elections via Voting Service Provider
Our paper deals with the question how remote e-voting can be put into practice in a secure and at the same time feasible way. We show that outsourcing the technical implementation of electronic elections to a Voting Service Provider (VSP) is one solution to this problem. Our concept can help election hosts to easily conduct electronic elections without having to take care of the necessary secur...
متن کاملTowards the impact of the operational environment on the security of e-voting
Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was focused on secure e-voting protocols. We show that the security of electronic elections requires a secure operational environment as well. We provide a comprehensive catalogue of organizational and technical requirements which...
متن کاملSecure Online Elections in Practice
Current remote e-voting schemes aim at a number of security objectives. However, this is not enough for providing secure online elections in practice. Beyond a secure e-voting protocol, there are many organizational and technical security requirements that have to be satisfied by the operational environment in which the scheme is implemented. We have investigated four state-of-the-art e-voting ...
متن کاملPrêt à Voter: All-In-One
A number of voter-verifiable electronic voting schemes have been introduced in the recent decades. These schemes not only provide each voter with a receipt without the threat of coercion and ballot selling, but also the ballot tallying phase can be publicly verified. Furthermore, these schemes are robust because the power of authorities can be threshold distributed. Generally speaking, the homo...
متن کامل