THE PEOPLE S CHOICE. Abstract. system. Team: FireDragon. Team Members: Shoufu Luo*, Jeremy D. Seideman*, Gary Tsai

Size: px
Start display at page:

Download "THE PEOPLE S CHOICE. Abstract. system. Team: FireDragon. Team Members: Shoufu Luo*, Jeremy D. Seideman*, Gary Tsai"

Transcription

1 The Economist Challenge THE PEOPLE S CHOICE A accountable distributed blockchain-based digital voting system Abstract With the advent of Bitcoin and related cryptocurrencies, the blockchain was introduced as a publically viewable ledger in more common use. Since then, blockchain-based consensus systems have been proposed, such as Helios, FollowMyVote and BitCongress etc., as the blockchain technique opens the possibility to a secure and tamper-resistant digital voting system. However, existing digital voting systems have different focus and therefore also shortcomings. In this paper, to the specific concerns cast by the Economist Challenge, we propose a distributed blockchain-based digital voting system with desired properties, namely, The People s Choice. We utilize mixing techniques to protect voter privacy, propose to use public-key encryption to prevent access to interim results etc. Finally, we provide a theoretical analysis of the resulting system. Team: FireDragon Team Members: Shoufu Luo*, Jeremy D. Seideman*, Gary Tsai The Graduate Center*, John Jay College of Criminal Justice, City University of New York Advisor: Dr. Sven Dietrich City University of New York, John Jay College of Criminal Justice & The Graduate Center

2 September 29, 2016 Table of Contents Abstract Introduction Digital Voting Systems Blockchain Technology Proof-of-Work Proof-of-Stake Delegated proof-of-stake Proposal The People s Choice The People The Rights The Genesis Block The Voting The Blockchain The Authority The Ballots Analysis: Counting (the ability to count) Privacy Potential Leakage and Accountability The Mixer and the Shadow Public Key Uniqueness Double-voting Interim Results Undecided Voters Aftermath Conclusion Appendix

3 Introduction Ever since humankind came together and lived as a society, the need for there to be some sort of consensus among the people has existed. Whether this means that people had to decide upon a leader or a course of action, there had to be a way to express that opinion. Over the years, there have been many ways to do that. At its simplest, voting has been just by voice -- the so-called yay/nay vote (Robert, 2011). That is, by no means, the only way that people can vote. Secret societies often use the black ball vote, where members place a token of one color or another into a box, so that when counting the votes it is obvious to see which side won the election. Digital Voting Systems With the advent of cryptocurrency, Bitcoin, the blockchain was introduced as a publically viewable ledger. Since then, blockchain-based digital voting systems have been proposed such as FollowMyVote and BitCongress etc., as the blockchain technique opens the possibility to a secure and tamper-resistant digital voting system. However, having a blockchain-based system does not insulate the users from some of the problems that the voting may carry. There is still a need to design a safe, anonymous system with the proper integrity and privacy controls. A prime

4 example of this is the Helios system (Adida, 2008). It is well designed but still there are several threats to the operation of this system, namely whether or not the decryption operation is performed properly, whether a voter is who they say they are or if they are impersonating someone else. By contrast, the pret-a-voter (PAV) system (Ryan, 2009) is an end-to-end auditable voting system and most PAV implementations also provide vote auditability. Admittedly, there are several vulnerabilities, most notably that it is possible to copy a ballot and distribute it to many voters to use it, and voters can take the candidate list with them to prove their vote was cast to satisfy a coercive party. Besides, FollowMyVote, which allows users to verify the interim result before the election official ends. Digital voting system with homomorphic sharing secrecy ( Schoenmakers, 1999) provides a very elegant solution in terms of privacy protection and interim results using homomorphic encryption with Shamir sharing secrecy but it fails to provide accountability, fraud prevention and undecided voters. In this paper, we propose an accountable blockchain-based system that inherits the merits of blockchain technique but also incorporates several improvements to create a platform for better privacy control and interim results prevention. Blockchain Technology The Blockchain is a public ledger with each block in the block chain formed by a number of transactions. A transaction will be validated by nodes of the peer-to-peer network and added to a new block which will be later attached to the chain following certain protocol, e.g. by the miner if the proof-of-work protocol is used. A new block of transactions will continuously

5 attach to the network of blocks as a link in a chain as time goes on, hence the term Blockchain. The chain acts as audit trail for a database which is managed by the network where no single computer is responsible for storing or maintaining the database, and any computer may enter or leave this network at any time without jeopardizing the integrity or availability of the database (Hourt, 2016). Since there is no centralization in Blockchain protocol, the problem of single point of failure is avoided. Proof-of-Work This technique was first introduced by Dwork (Dwork, 1993) to combat junk . The idea is to force the sender to perform amount of computational work (proof-of-work) before sending the , which introduces negligible work for a regular sender, however, significant work for a spammer who intends to send hundreds and thousands of spam s. Proof-of-work is used to prevent any arbitrary node to valid a transaction and add to a block at the same time, i.e. the double-spending problem. Proof-of-Stake Proof of stake is a new strategy for the substitution of proof-of-work as its vulnerability to 51% attack. The main difference in proof-of-stake is in order to become a miner, they need to prove the amount of stake they have in their balance ( Kiayias et al, 2016 ).

6 Delegated proof-of-stake Delegated proof-of-stake protocol is introduced by Bitshares 2.0. The word "Delegate" means witness in this technique (Schuh & Larimer, 2015). The only role of the witness is to validate block of transactions to the blockchain network. This protocol is taking a more democratic approach to validate transaction as it also allows any node in the network to become a witness. Proof of Work is used by Bitcoin and Ethereum, i.e. BitCongress, while Peercoin, another peer-to-peer cryptocurrency, adopts Proof-of-Stake (Hourt, 2016). Zerocoin Zerocoin ( Miers, 2013) and its successor Zerocash (Sasson, 2014) proposed an elegant mathematical solution for solving anonymity issue of Bitcoin, however, we found not necessary for a digital voting system as the intrinsic differences between the digital voting and digital currency, which we will discuss in detailed in the privacy analysis of our proposal. Proposal The People s Choice We propose a distributed digital voting system, The People s Choice. It consists of two components: registration and voting, as shown below in the figure separated by the dash line. There are seven major phases as illustrated below.

7 1. The People The Registrar Office (RO) generates two pairs of private key and public key, while each voter generates a pair of private key and public key. The pair (K, K ) is designed to prevent tallying interim results. K is kept secret during the election and will be eventually public as used to decipher all encrypted votes (by K) for final tally. The pair of (Q, Q ), however, serves for the authority, i.e. signature/verification, as Q used by the people to verify any message authorized by the Registrar Office, i.e. signed using Q. Voter s public key will serve as a legal reference of their voting rights once their eligibility is verified and a reference transaction is added to the genesis block.

8 2. The Rights Voters register themselves to the Registrar Office to prove the eligibility of voting. There are mainly two parts: Voters show their authorized ID or necessary materials and also a public key The Registrar Office validates voter's eligibility and gives a copy of Q. Note: the security concern in this verification process, e.g. ID fraud, is out of scope in this proposal. The key point is every eligible voter gets their public keys accepted as a legal reference of their voting rights, later executed by their private key. 3. The Genesis Block Once the voter is verified to be eligible, the Registrar Office keeps a record of this voter and the public key submitted The Registrar Office generates the first block of the chain, i.e. the genesis block. The genesis block or block 0 will include (Each transaction is signed with the Registrar Office s private key Q ): Reference transactions with each of which contains a voter s public key An extra transaction records other essential information about this election, such as the start and end date, the tally policy, the candidate list, the encryption key K, etc. 4. The Voting When voting, the voter first looks up the genesis block for the election encryption key K and the candidate list, also other additional information if necessary (Note: this can be done automatically by an authorized voting client. For the security of the voting client, the software can be

9 distributed securely offline such as in the registration time or online by signing with the Registrar Office s private key Q.). A vote generates a transaction which contains The reference transaction by specifying their public key A timestamp this vote is cast Encrypt their choice of candidate, by name or code, i.e. the vote Voter s Signature 5. The Blockchain The voting transaction is broadcasted to the peer-to-peer network. Anyone listening to the network will receive it, validate the transaction and build into a new block: Is the transaction valid, i.e. is the signature valid? By checking the signature using the attached the public key. Is the public key already referred by any accepted transaction in the block chain? If yes, reject; otherwise, pass. Note: we will discuss the block production in the following analysis section. 6. The Authority When the election ends, the Registrar Office publishes the decryption key K to the network, so that anyone in the network can use this Key to decrypt all encrypted votes in the blockchain. To avoid a single point of failure, e.g. corrupted RO, the decryption key K can be a share secrecy among several authorities, instead of just one, i.e. RO. Shamir s sharing secrecy using polynomial can be used with verifiable sharing secrecy

10 (VSS). At the end of election, if and only if, all parties publish their pieces, the decryption key can be reconstructed. 7. The Ballots Once the decryption K is published, anyone in the network can tally the election results. The authority may complete tally the blockchain or rely on other organization s partial results to conclude the final results. Since everyone can redo the counting of any block, it is not wise for anyone to post false results. Terms we use: Reference transaction: a transaction containing a voter s public key, published and signed by the Registrar Office, and used as a reference of legal right of voting Voting transaction: a transaction containing a vote, published and signed by a voter Analysis: Counting (the ability to count) All the purpose of election is to count. In our proposal, once the decryption key K is published, anyone can decrypt all votes and count the votes for each candidate. This is not a problem, although the counting procedure may depend on the election counting policy published in the genesis block, e.g. if a vote cates a candidate whose name or code does not match the one published in the genesis block, it might be considered as a void vote.

11 Privacy In this setting, privacy refers to the choice of a candidate, more specifically, the voter expects his/her vote should not be associated to his/her identity for all reasons. In another word, voters have the right of voting anonymity. Using public key, Bitcoin provides pseudonymity to some degree, but unfortunately as shown by research community, it fails to protect user s privacy. Our voting system follows in general the way of bitcoin using blockchain, e.g. each owner/voter owns a pair of public key and private key, and uses the public key as the interface between them and the system. However, it looks similar but actually very different for the following reasons. In the case of bitcoin, for various reasons, people whose identity is known will publish their public key to the public, for example, charity organizations calling for donations, commercial merchants for collecting payments, or individuals asking for giving etc. More importantly, transactions in the bitcoin are highly correlated and linked as they are traceable through the chain. Given these two prerequisites, the fact that all transaction details are transparent provides the possibility of tremendous information can be learned from available transaction flows. In the case of digital voting, people do not have the motivation to declare the ownership of a public key. Moreover, there is little information one could infer about one public key

12 from another because each voting transaction is independent, unlike bitcoin that transactions are highly related and connected because of the nature of spending coins. To the end, only the one who declares his/her public key is the victim of privacy violation, the voting choice. In short, as the voting part from the figure (i.e. below the dash line), the information one can at most learn is that there someone owns a public key, k, voted to a candidate c, and there little information can be used to infer who actually owns the public key in all means. On the other hand, there research work suggests that privacy might be also violated by simply mining blockchain logs for IPs (Koshy, 2014). This is similar to the aforementioned problem, a trustable voting client. The voter should only cast a vote in a secure software environment. Online services like Tor network or VPN can be used to bypass IP tracing for example. Potential Leakage and Accountability In this proposal, we may assume the Registrar Office is trusted. By saying that, we mean the Registrar Office will make every effort to follow the protocol to keep data safe for any security and privacy concerns. However, one may still ask, what if the database leaked for any reason, (e.g. data breach) or corrupted RO (e.g. insider leaks the data)? Indeed, data breach is not infrequent thing nowadays and people have political motivations to steal such essential data. And not maintaining it at very beginning is also not a legitimate option for accountability purposes. In fact, legitimate vote records must be recorded precisely and public accessible. For example,

13 without such records, what if the Registrar Office or insiders in charge misconducts and falsely uses unregistered voters identities (i.e. ghost voter). The Mixer and the Shadow Public Key For such a consideration, our proposal introduces an additional step of obfuscation before the registration process so that the legitimate vote table is public accessible but won t cause privacy concern. As noted, each voter will generate a pair of private key and public key. However, instead of submitting his/her own public key, voters go to a third-party mixer pool to exchange their public keys and get a shadow public key which will be submitted to RO. For example, in the diagram below, voter i submit public key i and get assigned a public key of voter k. Then, voters submit the assigned public key during their registration. In this way, after exchanging public keys (and only public keys), as a voter s public key will be submitted by other voter into the election pool, i.e. the genesis block, a voter can still vote using his/her private key. The public key in record is however no longer his/hers, therefore, the vote associated to that public key is not what he/she votes. To ensure the anonymity efficiency, the mixer should be large enough, e.g. at least k for k-anonymity. To ensure the security, this mixing can happen among a group of trusted voters. In the case of untrusted voters, the mixer may run pre-screening of participants eligibility when

14 accepting public keys, but without keeping records because accounting is not wanted here. Fraud behavior is easy to detect in this setting as those legitimate voters can find out whether their public keys are not listed in the genesis block. To prevent fraud, RO should be able to provide services to let voters to revoke the public key and submit a new one also. Uniqueness Voter uniqueness is guaranteed by the registration process, i.e. every legitimate voter can submit one public key and only one as a reference of legitimacy. But it is noted in the previous section, to ensure the security of the mixing, including the uniqueness issue, the mixer should take appropriate steps to protect against frauds. Double-voting Double-voting can be prevented if (1) uniqueness is guaranteed and (2) the block produced only includes valid transactions, i.e. checking if a reference transaction is referred by any existing voting transaction. For (2), despite of known issues of proof-of-work, we argue that it can be a solution. Different from bitcoin, in our proposal, there is no direct reward for mining, but we believe there are political incentives that individuals, organizations or governments would commit computational resources for proof-of-work and produce blocks. Other alternatives may be also applicable to our system, such as delegated proof-of-stake, for example.

15 Interim Results As illustrated, voters use the encryption key K to encrypt t heir votes, no one can actually tall those votes until the decryption K published at the end of the election. Secret sharing can be used to effectively prevent a single point of failure such as the RO as it is unlikely for several authorities to accomplice to reconstruct the key for interim results during the election. Undecided Voters If we interpret voters as eligible potential citizens, there are two types of undecided voters: either not registered or registered but undecided which candidate to vote. As aforementioned that the RO is obliged to publish the legitimate vote table, it is accountable to find every vote in the election pool comes from a legitimate registered voter, i.e. there should not be any ghost voter. For those undecided which candidate to vote, they can easily check whether any voting transaction in the block chain refer to the reference transaction which belongs to him/her as guaranteed by the blockchain technique, every voting transaction should be traceable to the reference transaction by once and exactly once. It is very also unlikely given the assumption that the public key scheme is strong enough, e.g. RSA. Aftermath Two fundamental keys ensure our proposal accountable for aftermath investigation: the traceability and the integrity of all votes. The traceability is provided by an accountable registration process and the blockchain, which enables each every ballot can be traced back to a legitimate vote. Also, by this, undecided votes are under monitoring so that they are not falsely

16 used to support a candidate. While, without integrity, the traceability is meaningless for any investigation. As well known, blockchain itself provides certain protection against altering the ledger. In addition, each voting transaction is also signed by each voter to guarantee that its integrity. There some particular security concerns have been addressed in the proposal design section, for example, the secure voting environment and potential fraud prevention. Conclusion In this paper, we propose a digital voting system, The People s Choice, addressed concerns cast in the challenge. It utilizes the blockchain techniques, the public key, the mixing net and etc. It inherits a similar framework of the blockchain used in Bitcoin but novelized in the transaction forming for the voting purpose, privacy protection and interim results prevention in particular. There is still room for improvement, e.g. the secrecy of the decryption key K during the election period. Shamir s secret sharing is still vulnerable to a single point of failure in terms of preventing interim results even with verifiable secret sharing, which we leave for further work. Appendix Adida, Ben. "Helios: Web-based Open-Audit Voting." USENIX Security Symposium. Vol Kiayias, Aggelos, et al. "A Provably Secure Proof-of-Stake Blockchain Protocol." (2016). Buterin, Vatalik. "What Is Ethereum?" What Is Ethereum? N.p., 9 Mar Web. 25 Sept

17 Hourt, Nathan. "Blockchain Technology in Online Voting - Follow My Vote." Follow My Vote. N.p., n.d. Web. 28 Sept (ICFAI), Prableen Bajpai CFA. "Blockchain." Investopedia. N.p., 02 Jan Web. 28 Sept Norton, Steven. "CIO Explainer: What Is Blockchain?" WSJ. Wsj.com, 02 Feb Web. 28 Sept Johnston, Roger and Suzanne LaBarre. How I Hacked an Electronic Voting Machine. Popular Science, Nov 5, Robert, Henry M.; et al. (2011). Robert's Rules of Order Newly Revised (11th ed.). Philadelphia, PA: Da Capo Press. ISBN (hardcover), ISBN (paperback),isbn (leatherbound) Ryan, Peter YA, et al. "Prêt à voter: a voter-verifiable voting system." IEEE transactions on information forensics and security 4.4 (2009): Schuh, Fabian, and Daniel Larimer. "BIT S HARES 2.0: GENERAL OVERVIEW.": n. pag. BitShares, 15 Dec Web. Koshy, Philip, Diana Koshy, and Patrick McDaniel. "An analysis of anonymity in bitcoin using p2p network traffic." International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, Schoenmakers Berry, A simple publicly verifiable secret sharing scheme and its application to electronic voting, Springer-Verlag, In CRYPTO, 1999 Dwork, Cynthia; Naor, Moni (1993). "Pricing via Processing, Or, Combatting Junk Mail, Advances in Cryptology". CRYPTO 92: Lecture Notes in Computer Science No Springer: Miers, Ian, et al. "Zerocoin: Anonymous distributed e-cash from bitcoin." Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, Sasson, Eli Ben, et al. "Zerocash: Decentralized anonymous payments from bitcoin." 2014 IEEE Symposium on Security and Privacy. IEEE, Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." (2008). FollowMyVote, BitCongress,

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan

More information

Running head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams

Running head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams Running head: ROCK THE BLOCKCHAIN 1 Rock the Blockchain: Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams University of Maryland University College (UMUC) Author Note Thanks to our UMUC

More information

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez The Economist Case Study: Blockchain-based Digital Voting System Team UALR Connor Young, Yanyan Li, and Hector Fernandez University of Arkansas at Little Rock Introduction Digital voting has been around

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

An untraceable, universally verifiable voting scheme

An untraceable, universally verifiable voting scheme An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

Ad Hoc Voting on Mobile Devices

Ad Hoc Voting on Mobile Devices Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013

More information

Author(s) Takabatake, Yu; Kotani, Daisuke; Ok.

Author(s) Takabatake, Yu; Kotani, Daisuke; Ok. Title An anonymous distributed electronic Zerocoin Author(s) Takabatake, Yu; Kotani, Daisuke; Ok Citation IEICE Technical Report = 信学技報 (2016 131 Issue Date 2016-11 URL http://hdl.handle.net/2433/217329

More information

A Block-Chain Implemented Voting System. The Benefits and Risks of Block-Chain Voting

A Block-Chain Implemented Voting System. The Benefits and Risks of Block-Chain Voting A Block-Chain Implemented Voting System The Benefits and Risks of Block-Chain Voting Francesca Caiazzo Computer System Security Professor Ming Chow December 14, 2016 1 Table of Contents Abstract... 2 Introduction...

More information

Blockchain a brief overview

Blockchain a brief overview Imperial College London Blockchain a brief overview Dr Cathy Mulligan Research Fellow Co-Director, Centre for Cryptocurrency Research and Engineering Expert and Fellow, World Economic Forum Blockchain

More information

Distributed Protocols at the Rescue for Trustworthy Online Voting

Distributed Protocols at the Rescue for Trustworthy Online Voting Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2

More information

Netvote: A Blockchain Voting Protocol

Netvote: A Blockchain Voting Protocol Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

A Study on Ways to Apply the Blockchain-based Online Voting System 1

A Study on Ways to Apply the Blockchain-based Online Voting System 1 , pp.121-130 http//dx.doi.org/10.14257/ijca.2017.10.12.11 A Study on Ways to Apply the Blockchain-based Online Voting System 1 Hye Ri Kim 1, Kyoungsik Min 2,* and Seng-phil Hong 3 1 Dept. of Computer Science,

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

Josh Benaloh. Senior Cryptographer Microsoft Research

Josh Benaloh. Senior Cryptographer Microsoft Research Josh Benaloh Senior Cryptographer Microsoft Research September 6 2018 Findings and Recommendations The election equipment market and certification process are badly broken. We need better ways to incentivize

More information

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES

More information

Electronic Voting Service Using Block-Chain

Electronic Voting Service Using Block-Chain Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 8 2016 Electronic Voting Service Using Block-Chain Kibin Lee Korea University Joshua I. James Hallym University, joshua+jdfsl@dfir.science

More information

Voting Protocol. Bekir Arslan November 15, 2008

Voting Protocol. Bekir Arslan November 15, 2008 Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

An Overview on Cryptographic Voting Systems

An Overview on Cryptographic Voting Systems ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where

More information

L9. Electronic Voting

L9. Electronic Voting L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections

More information

32 nd CIRIEC International Congress

32 nd CIRIEC International Congress 32 nd CIRIEC International Congress AWARENESS AND ATTITUDES TOWARDS DIGITAL CURRENCIES IN NON-PROFIT ORGANIZATIONS: AN ANALYSIS FROM TURKEY Semra BOĞA, PhD Istanbul Gelişim University Background of the

More information

An Introduction to Cryptographic Voting Systems

An Introduction to Cryptographic Voting Systems Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic

More information

Coin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf

Coin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Coin-Vote Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Abstract: Coin-vote is a voting system for establishing opinion and resolving disputes amongst willing participants. Rather than using

More information

AnonStake: An Anonymous Proof-of-Stake Cryptocurrency via Zero-Knowledge Proofs and Algorand

AnonStake: An Anonymous Proof-of-Stake Cryptocurrency via Zero-Knowledge Proofs and Algorand AnonStake: An Anonymous Proof-of-Stake Cryptocurrency via Zero-Knowledge Proofs and Algorand Shashvat Srivastava MIT Primes Under the Direction of Ms. Kyle Hogan Massachusetts Institute of Technology October

More information

Bitcoin And Cryptocurrency Technologies A Comprehensive Introduction

Bitcoin And Cryptocurrency Technologies A Comprehensive Introduction Bitcoin And Cryptocurrency Technologies A Comprehensive Introduction We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on

More information

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Secure Voter Registration and Eligibility Checking for Nigerian Elections Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017

More information

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical

More information

OPEN SOURCE CRYPTOCURRENCY E-PUB

OPEN SOURCE CRYPTOCURRENCY E-PUB 09 April, 2018 OPEN SOURCE CRYPTOCURRENCY E-PUB Document Filetype: PDF 441.89 KB 0 OPEN SOURCE CRYPTOCURRENCY E-PUB A nnouncing Royal Coin ( ROYAL ), an experimental open-source decentralized CryptoCurrency

More information

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,

More information

A fair rewarding, powered blockchain based, business tokenization platform

A fair rewarding, powered blockchain based, business tokenization platform A fair rewarding, powered blockchain based, business tokenization platform WhitePaper V1.1 November 20, 2017 tokengoplatform.com Table of contents Abstract Introduction Blockchain Applicability Demand

More information

Towards a Practical, Secure, and Very Large Scale Online Election

Towards a Practical, Secure, and Very Large Scale Online Election Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,

More information

A social network for cannabis users on the blockchain.

A social network for cannabis users on the blockchain. Smoke.Network Smoke, Get Paid. Repeat. Introducing! A social network for cannabis users on the blockchain. Smoke.Network is an incentivised, distributed delegated proof of stake blockchain for the cannabis

More information

The usage of electronic voting is spreading because of the potential benefits of anonymity,

The usage of electronic voting is spreading because of the potential benefits of anonymity, How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic

More information

PRIVACY PRESERVING IN ELECTRONIC VOTING

PRIVACY PRESERVING IN ELECTRONIC VOTING PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District

More information

The Key To Unlocking The Black Box: Why The World Needs A Transparent Voting DAC

The Key To Unlocking The Black Box: Why The World Needs A Transparent Voting DAC 2014 The Key To Unlocking The Black Box: Why The World Needs A Transparent Voting DAC This paper details how improving the way a democratic society casts it votes can be accomplished through the development

More information

Towards Secure Quadratic Voting

Towards Secure Quadratic Voting Towards Secure Quadratic Voting Sunoo Park Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139 sunoo@mit.edu Ronald L. Rivest Computer Science

More information

Terms of Token Offer

Terms of Token Offer Last updated: 22 th of July 2018 Harbor Terms of Token Offer Please read carefully these terms of token offer (hereinafter the terms ) before exchanging Harbor token, as they affect your obligations and

More information

THE FUTURE OF E-VOTING

THE FUTURE OF E-VOTING IADIS International Journal on Computer Science and Information Systems Vol. 12, No. 2, pp. 148-165 ISSN: 1646-3692 THE FUTURE OF E-VOTING Pavel Tarasov and Hitesh Tewari School of Computer Science and

More information

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,

More information

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT: SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of

More information

Survey of Fully Verifiable Voting Cryptoschemes

Survey of Fully Verifiable Voting Cryptoschemes Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project

More information

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1 (19) United States US 20170 109955A1 (12) Patent Application Publication (10) Pub. No.: US 2017/0109955 A1 Ernest et al. (43) Pub. Date: (54) BLOCKCHAIN ELECTRONIC VOTING (52) U.S. Cl. SYSTEMAND METHOD

More information

Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema

Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Dermot Cochran IT University Technical Report Series TR-2015-189 ISSN 1600-6100 August 2015 Copyright 2015,

More information

XMX. A bridge of trust between the Mexican Peso and Cryptocurrency. April 2018 (v1.7)

XMX. A bridge of trust between the Mexican Peso and Cryptocurrency. April 2018 (v1.7) XMX A bridge of trust between the Mexican Peso and Cryptocurrency fh@kampio.com April 2018 (v1.7) Abstract There is a great divide between cryptocurrency and fiat, and until we build a bridge of trust

More information

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV G B + + B - Ballot Ballot Box Mixer Receipt ThreeBallot, VAV, and Twin Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV Talk at EVT 07 (Boston) August 6, 2007 Outline End-to-end voting systems ThreeBallot

More information

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION Manabu Okamoto 1 1 Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi, Kanagawa 243-0292, Japan manabu@nw.kanagawa-it.ac.jp ABSTRACT

More information

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,

More information

Table Of Contents. 3.3 Enterprise Blockchain: Decentralized Storage For Centralized Data

Table Of Contents. 3.3 Enterprise Blockchain: Decentralized Storage For Centralized Data The Whitepaper Table Of Contents 1. Abstract 2. Introduction 2.1 Our Mission Statement: Safety & Familiarity 2.2 BitCoinage Will Be Comprised of Three Independent Companies 2.3 Three Keys To Widespread

More information

ESTONIAN STATE S APPROACH TO CRYPTOCURRENCY: THE CASE STUDY OF ESTCOIN PROJECT

ESTONIAN STATE S APPROACH TO CRYPTOCURRENCY: THE CASE STUDY OF ESTCOIN PROJECT TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Social Sciences Ragnar Nurske School of Innovation and Science Yuliya Polyakova ESTONIAN STATE S APPROACH TO CRYPTOCURRENCY: THE CASE STUDY OF ESTCOIN PROJECT

More information

Security Analysis on an Elementary E-Voting System

Security Analysis on an Elementary E-Voting System 128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages

More information

Terms and Conditions

Terms and Conditions Last Updated: 22 th of July 2018 HARBOR Terms and Conditions Please read carefully these Terms and Conditions (hereinafter the Terms ) before using a website https://toharbor.com/ (hereinafter the Website

More information

Economic and Social Council (ECOSOC) The question of cryptocurrency

Economic and Social Council (ECOSOC) The question of cryptocurrency Forum: Issue: Student Officer: Position: Economic and Social Council (ECOSOC) The question of cryptocurrency Merve Nur Erkoç President Chair Introduction The frenzy behind the digital currency heats up

More information

On Some Incompatible Properties of Voting Schemes

On Some Incompatible Properties of Voting Schemes This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties

More information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes. Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other

More information

Privacy of E-Voting (Internet Voting) Erman Ayday

Privacy of E-Voting (Internet Voting) Erman Ayday Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken

More information

An Object-Oriented Framework for Digital Voting

An Object-Oriented Framework for Digital Voting An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo

More information

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris

More information

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System 29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu

More information

White Paper Social Send Coin (SEND)

White Paper Social Send Coin (SEND) White Paper Social Send Coin (SEND) Version: 1.0.0.1 (English) Last Updated: 28 th Jan 2018 DISCLAIMER PLEASE READ THIS DISCLAIMER SECTION CAREFULLY. IF YOU ARE IN ANY DOUBT REGARDING THE ACTION YOU SHOULD

More information

Cryptographic Voting Protocols: Taking Elections out of the Black Box

Cryptographic Voting Protocols: Taking Elections out of the Black Box Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

OCSE Vienna 17/ Open Source Remote Electronic Voting in Norway

OCSE Vienna 17/ Open Source Remote Electronic Voting in Norway OCSE Vienna 17/9 2010 Open Source Remote Electronic Voting in Norway Project Manager Henrik Nore The Ministry of Local Government and Regional Development Project scope Why internet voting increase availability

More information

U2NESCO 2019 CHAIR REPORT Committee: Group of 20 Summit Agenda: On measures to promote and regulate the use of cryptocurrencies and blockchain

U2NESCO 2019 CHAIR REPORT Committee: Group of 20 Summit Agenda: On measures to promote and regulate the use of cryptocurrencies and blockchain Marco Nie 1 U2NESCO 2019 CHAIR REPORT Committee: Group of 20 Summit Agenda: On measures to promote and regulate the use of cryptocurrencies and blockchain technologies Officer: Marco Nie Introduction:

More information

arxiv: v3 [cs.cr] 3 Nov 2018

arxiv: v3 [cs.cr] 3 Nov 2018 Exploiting re-voting in the Helios election system Maxime Meyer a, Ben Smyth b arxiv:1612.04099v3 [cs.cr] 3 Nov 2018 Abstract a Vade Secure Technology Inc., Montreal, Canada b Interdisciplinary Centre

More information

White Paper for the People Uniquely Zimbabwean, Globally Recognised

White Paper for the People Uniquely Zimbabwean, Globally Recognised White Paper for the People Uniquely Zimbabwean, Globally Recognised www.zimbo.cash Contents: FREE ZIMBOCASH IN YOUR HANDS 3 A ZIMBOCASH MOVEMENT 4 EXISTING CHALLENGES 5 OUR VISION 6 WHY IS ZIMBOCASH SO

More information

A Secure Paper-Based Electronic Voting With No Encryption

A Secure Paper-Based Electronic Voting With No Encryption A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakoly, Reza Ebrahimi Atani Department of Computer Engineering, Faculty of engineering, University of Guilan, P.O. Box 3756, Rasht, Iran.

More information

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia 662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,

More information

PRIVACY in electronic voting

PRIVACY in electronic voting PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis

More information

Ballot Reconciliation Procedure Guide

Ballot Reconciliation Procedure Guide Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

The E-voting Controversy: What are the Risks?

The E-voting Controversy: What are the Risks? Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April

More information

BOLENUM. White Paper February 2017

BOLENUM. White Paper February 2017 BOLENUM White Paper February 2017 Contents Background 3 The Issue 4 The Solution 5 The ICO 7 Background The creation of cryptocurrency in 2009 was a technological revolution. In the eight years since,

More information

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM PROJECT REFERENCE NO.: 39S_BE_1662 COLLEGE BRANCH GUIDE STUDETS : AMRUTHA INSTITUTE OF ENGINEERING AND MANAGEMENT SCIENCE, BENGALURU : DEPARTMENT

More information

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher

More information

Large scale elections by coordinating electoral colleges

Large scale elections by coordinating electoral colleges 29 Large scale elections by coordinating electoral colleges A. Riem, J. Borrell, J. Rifa Dept. d'lnformatica, Universitat Autonoma de Barcelona Edifici C- 08193 Bellaterm - Catalonia {Spain} Tel:+ 34 3

More information

Functional Requirements for a Secure Electronic Voting System

Functional Requirements for a Secure Electronic Voting System Functional Requirements for a Secure Electronic Voting System Spyros IKONOMOPOULOS 1, Costas LAMBRINOUDAKIS 1, Dimitris GRITZALIS 2, Spyros KOKOLAKIS 1, Kostas VASSILIOU 1 1 Dept. of Information and Communication

More information

ZEN PROTOCOL SOFTWARE LICENSE

ZEN PROTOCOL SOFTWARE LICENSE ZEN PROTOCOL SOFTWARE LICENSE This Zen Protocol Software License (this "Agreement" ) governs Your use of the computer software (including wallet, miner, tools, compilers, documentation, examples, source

More information

Accessible Voter-Verifiability

Accessible Voter-Verifiability Cryptologia, 33:283 291, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190902894946 Accessible Voter-Verifiability DAVID CHAUM, BEN HOSP, STEFAN POPOVENIUC, AND POORVI

More information

Security Assets in E-Voting

Security Assets in E-Voting Security Assets in E-Voting Alexander Prosser, Robert Kofler, Robert Krimmer, Martin Karl Unger Institute for Information Processing, Information Business and Process Management Department Production Management

More information

An Application of time stamped proxy blind signature in e-voting

An Application of time stamped proxy blind signature in e-voting An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer

More information

Token Sale Agreement. The world s best cryptocurrency-based autonomous marketplace of services.

Token Sale Agreement. The world s best cryptocurrency-based autonomous marketplace of services. Token Sale Agreement The world s best cryptocurrency-based autonomous marketplace of services. Contents page 1. Transfer of CanYaCoins 1 2. Bonus Offer 2 3. Conditions Precedent 2 4. Right to Use Platform

More information

GENERAL TERMS & CONDITIONS

GENERAL TERMS & CONDITIONS TAXI GROUP LTD. U.K. GENERAL TERMS & CONDITIONS 02 Jun 2018 GENERAL TERMS AND CONDITIONS OF PINK TAXI GROUP LTD. TOKENS SALE Please read carefully these General Terms of Pink Taxi Group Ltd. Tokens Sale

More information

Secured Electronic Voting Protocol Using Biometric Authentication

Secured Electronic Voting Protocol Using Biometric Authentication Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication

More information

Brittle and Resilient Verifiable Voting Systems

Brittle and Resilient Verifiable Voting Systems Brittle and Resilient Verifiable Voting Systems Philip B. Stark Department of Statistics University of California, Berkeley Verifiable Voting Schemes Workshop: from Theory to Practice Interdisciplinary

More information

Electronic Voting Machine Information Sheet

Electronic Voting Machine Information Sheet Name / Model: eslate 3000 1 Vendor: Hart InterCivic, Inc. Voter-Verifiable Paper Trail Capability: Yes Brief Description: Hart InterCivic's eslate is a multilingual voter-activated electronic voting system

More information

Autonocoin: A Proof-of-Belief Cryptocurrency

Autonocoin: A Proof-of-Belief Cryptocurrency RESEARCH ARTICLE Autonocoin: A Proof-of-Belief Cryptocurrency Michael Abramowicz * Abstract. This paper proposes a self-governing cryptocurrency, dubbed Autonocoin. Cryptocurrency owners play formal tacit

More information

Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system?

Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system? Sorry. Can you please just say your name? Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system? Well, that's such a terrible question.

More information

Agora. Bringing our voting systems into the 21st century. Whitepaper Version 0.2

Agora. Bringing our voting systems into the 21st century. Whitepaper Version 0.2 Agora Bringing our voting systems into the 21st century Whitepaper Version 0.2 CONTENTS Disclaimer 1. AGORA 1.1. Mission Transparency Privacy Integrity Affordability Accessibility 1.2. Our Customers Providing

More information

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30

More information

Primecoin: Cryptocurrency with Prime Number Proof-of-Work

Primecoin: Cryptocurrency with Prime Number Proof-of-Work Primecoin: Cryptocurrency with Prime Number Proof-of-Work Sunny King (sunnyking9999@gmail.com) July 7 th, 2013 Abstract A new type of proof-of-work based on searching for prime numbers is introduced in

More information

investing guide cryptocurrency trading

investing guide cryptocurrency trading Cryptocurrency Investing The Ultimate Guide To Making Your First 100000 In Cryptocurrency Investing In Cryptocurrency Cryptocurrency Investing Guide Cryptocurrency Trading CRYPTOCURRENCY INVESTING THE

More information

Fourth-generation cryptocurrency platform creation. White Paper. Ver TUX GLOBAL SDN.BHD.

Fourth-generation cryptocurrency platform creation. White Paper. Ver TUX GLOBAL SDN.BHD. Fourth-generation cryptocurrency platform creation White Paper Ver. 3.0 Greeting TOUREXCOIN is a cryptocurrency developed for the purpose of establishing means of settlement by cryptocurrency in Cambodia

More information

Blind Signatures in Electronic Voting Systems

Blind Signatures in Electronic Voting Systems Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.

More information

6. Voting for the Program will be available for five (5) weeks from Monday 13 June 2016.

6. Voting for the Program will be available for five (5) weeks from Monday 13 June 2016. The Voice IVR Voting Terms and Conditions About the Voting Service 1. These Terms govern the Voice Voting Service. Lodging a Vote for and Artist competing in The Voice Australia 2016 is deemed acceptance

More information

Secure and Reliable Electronic Voting. Dimitris Gritzalis

Secure and Reliable Electronic Voting. Dimitris Gritzalis Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote

More information

Remote Internet voting: developing a secure and efficient frontend

Remote Internet voting: developing a secure and efficient frontend CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February

More information

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013 Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London

More information