CHAPTER 2 LITERATURE REVIEW
|
|
- Alaina Pope
- 6 years ago
- Views:
Transcription
1 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et al (1981) discussed about voting entails a democratic apparatus used to enthrone democratic leaders and in some quarters it is regarded as one of the most effective methods for individuals to express their opinions on a given topic. Nurmi et al (1991) developed two agency protocols. In this two agency protocols, the electronic validator distributes a secret identification tag to each voter just prior to the election. The validator then sends the tallier a list of all identification tags, with no record of the corresponding voters. Each voter sends the tallier his / her identification tag and an encrypted file contacting a copy of the tag and the voted ballot. At this point the tallier can make sure the identification tag is valid, but the program has no way of examining the contents of the ballot. The tallier publishes the encrypted file, and the voter responds by sending the tallier the key necessary to decrypt it. When the election is over, the tallier publishes a list of all voted ballots and the corresponding encrypted files. This protocol also has several problems. Most importantly it doesn t protect the voter s privacy if the tallier and validator collude.
2 20 Fujioka et al (1992) developed a practical voting scheme using blind signatures. Blind signatures allow a document to be signed without revealing its contents. The effect is similar to placing a document and a sheet of carbon paper inside of the envelope. If somebody signs the outside of the envelope, they also sign the document on the inside of the envelope. The signature remains attached to the document, even when it is removed from the envelope. The voter prepares a voted ballot, encrypts it with a secret key, and blinds it. The voter then signs the ballot and sends it to the validator. The validator verifies that the signature belongs to registered voter who has not yet voted. If the ballot is valid, the validator signs the ballot and returns it to the voter. The voter removes the blinding encryption layer, revealing an encrypted ballot signed by the validator. The voter then sends the resultant encrypted ballot to the tallier. The tallier checks the signature on the encrypted ballot. If the ballot is valid, the tallier places it on a list that is published after all voters vote. After the list has been published, voters verify that their ballots are on the list and send the tallier the decryption keys necessary to open their ballots. The tallier uses these keys to decrypt the ballots and add the votes to the election tally. Neumann et al (1993) gives a list of suggestions for "generic voting criteria" which suggests that a voting system should be so hard to tamper with and so resistant to failure that no commercial system is likely to ever meet the requirements, and developing a suitable custom system would be extremely difficult and prohibitively expensive. Philip Klein et al (1995) presents a remote voting scheme that applies the technique of blinded signature to a voter's ballot so that it is impossible for anyone to trace the ballot back to the voter. They achieve the desired properties of privacy, universal verifiability, convenience and untraceability, but at the expense of receipt-freeness.
3 21 Sako et al (1995) introduces the concept of universal verifiability to emphasize the importance of auditing of overall election by categorizing the verifiability as individual variability and universal verifiability. In their approach, a sender can verify whether or not his message has reached its destination, but cannot determine if this is true for the other voters and also in the course of the protocol the participants broadcast information that allows any voter or interested third party to at a later time verify that the election was performed properly or not. A very first attempt was designed by Cranor et al (1996) without employing any cryptographic techniques. In this, voters would submit their vote along with a unique identification number to a validator who would then take their name off on a list of registered voters. Then the validator would then strip off the Unique Identification number and submit just the votes to the tallier who would count the votes. Although this system has the advantages of being flexible, convenient and mobile, this system is far from secure. If the validator is compromised votes can be easily traced back to the voter or votes could be changed. Both privacy and accuracy lack with this protocol. There is no way to ensure the voter s privacy and the tallier accurately records the votes. Cranor et al (1997) proposed and implemented a protocol based on Fujioka s scheme called Sensus. One of the drawbacks of the Blind Signature protocol is the voter has to wait till the voting has ended before the voter can verify the casted vote was the correct one, which is not in line with the property of flexibility. Sensus system is closely based on the Blind Signature protocol. The major difference between the schemes emerges after the voter has submitted the encrypted ballot to the tallier. Instead of waiting till the voting ends the tallier sends a receipt to the voter when his/her ballot has been received. This receipt is no more than a confirmation the vote has been
4 22 transferred to the tallier correctly. The voter may submit the decryption key immediately after receiving this receipt, completing the entire voting process in one session. The implemented Sensus system employs a pollster agent that performs all cryptographic functions and transactions with the election programs on the voter s behalf. Tests conducted with a prototype implementation of Sensus indicate that the entire voting process can be completed within a few minutes. Yahuda Lindell et al (2000) discussed the comparison of Symmetric key and public key cryptosystem. It also discussed about how to achieve authentication using Symmetric key Cryptosystem and Asymmetric key Cryptosystem. Symmetric key encryption algorithms are suitable for providing high security in smart card applications when compared to Public key algorithm. But, Asymmetric encryption provides more functionality than symmetric encryption, at the expense of speed and hardware cost. Aviel et al (2002) discusses the security considerations for remote electronic voting in public elections. In particular, he examines the feasibility of running national federal elections over the Internet. The focus of his paper is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. He finally concluded that at present, the infrastructure is inadequate for remote Internet voting. Gritzalis et al (2002) expresses that voting is a process at the heart of a democratic society. He therefore stressed that in recent democratic elections using voting machines have shown that the winning margins could be less than the error margins of the voting systems themselves, making election an error prone task. Hence the use of electronic voting has the potential to reduce or remove unwanted human errors. In addition to its reliability, e-voting can handle multiple modalities such as voice assistance for handicap, and provide better scalability for large elections. He stated that
5 23 e-voting is also an excellent mechanism that does not require geographically proximity of the voters. Mercuri et al (2002) invented the Mercuri method for electronic voting. A critical component of this method is very similar to the Caltech/MIT proposal: a voting machine must produce human readable hardcopy paper results, which can be verified by the voter before the vote is cast, and manually recounted later if necessary. Her philosophy and Neumann s are very similar. Peter et al (2003) discusses a secure PKI based system for e-voting that was developed. They tested the application, several organizational aspects, and usability in fourteen field trials. In their paper they describe the method and findings. What they learn about turnout, about the logistics of organizing e-voting, and about usability and reliability of the system in practice. Alexander et al (2004) in his paper discusses what threats e-voting faces. The purpose of his paper is to give a systematically ordered overview of attacks against e-voting and to show one solution to the issues. The challenge is to provide identification and anonymity at the same time and to exclude the possibility of fraudulent manipulations by the server administration, the voter, and any third party. Kohno et al (2004) discusses on the criticism in the Direct Recording Electronic (DRE) voting systems in which they pointed out that due to various deficiencies and security vulnerabilities it has being widely criticized. Therefore they believe is that the software undergoes insufficient scrutiny during qualification and certification; that DREs are especially vulnerable to various form of insider programmer attacks; and that DREs have no voter-verified audit trails paper or otherwise that could largely
6 24 circumvent these problems. All of these criticisms of DREs apply directly to SERVE as well. Liaw et al (2004) discussed the properties of electronic voting system and how their proposed electronic voting scheme try to satisfy these properties is also mentioned. The main principle of e-voting is that it must be as similar to regular voting as possible, complaint with election legislation and principles and be at least as secure as regular voting. Therefore e-voting must be uniform and secret, only eligible persons must be allowed to vote, a voter must not be able to prove in favor of whom he/she voted. In addition to this the collecting of votes must be secure, reliable and accountable. Sonja Hof et al (2004) reported about biometric approaches to e-voting. There are different biometrics approaches i.e., fingerprint, iris, face, voice, signature, DNA analysis and multi biometric systems are discussed. He discussed about how biometrics concepts can be used in e-voting. It does not interact in any way with the biometric characteristics of the actual users, authenticates the user with the help of user s authentication certificate as present on the card. Kalaichelvi et al (2005) developed a new technique for encryption & decryption. It used the substitution and inverse substitution table for encryption & decryption. These tables constructed based on ASCII value and the key value. And it also discussed the three types folding technique. Karlof et al (2005) took a different approach from the other researchers as they do not distinguishing universal or individual verifiability. So their definition states that verifiability means each voter should be able to verify his ballot accurately represents the vote he cast. Verifiability countedas-cast means everyone should be able to verify that the final is an accurate count of the ballots. Therefore it can be seen from the definitions arrived at by
7 25 the different researchers that individual verifiability and universal verifiability basically are centered on the fact that every voter can check if his vote has been properly counted and anyone can check that the calculated result is correct and election is performed correctly. Sampigethaya et al (2006) looks at the numerous e-voting protocols proposed which are meant to fulfill different requirement sets using cryptographic tools and primitives, these underlying primitives are mainly blind signatures and homomorphic encryption. Chetinkaya et al (2007) reported the verification and validation in e-voting and gave the proper definitions for verifiability and validity. It describes about verification and validation activities and explains the relationship between and core requirements to any e-voting system. It also stated that some problems for designing and developing secure e-voting systems. Sarah et al (2008) reported about the comparison of efficiency of the DRE with the with traditional machines. (paper ballots, punch cards, and lever machines). Results indicate that there were little differences between the DRE and these older methods in efficiency or effectiveness. However, in terms of user satisfaction, the DRE was significantly better than the older methods. Paper ballots also perform well, but participants were much more satisfied with their experiences voting on the DRE. It indicates that there were little differences between DRE and traditional methods in efficiency. From the above literature review, it could be understood that the published information on Secured Electronic Voting Systems is very scanty. However, the topic is gaining more importance very recently among the researchers and this indicates the high priority of researchers towards this topic.
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationSecured Electronic Voting Protocol Using Biometric Authentication
Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationSMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:
SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationDesigning issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.
PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationTowards a Practical, Secure, and Very Large Scale Online Election
Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,
More informationAn untraceable, universally verifiable voting scheme
An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationThe E-voting Controversy: What are the Risks?
Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationEXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering,
EJISDC (2005) 22, 5, 1-9 EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN Mohsen Kahani (kahani@um.ac.ir) Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran Abstract Electronic
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationFULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF
FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationAn Object-Oriented Framework for Digital Voting
An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationE-Voting, a technical perspective
E-Voting, a technical perspective Dhaval Patel 04IT6006 School of Information Technology, IIT KGP 2/2/2005 patelc@sit.iitkgp.ernet.in 1 Seminar on E - Voting Seminar on E - Voting Table of contents E -
More informationBlind Signatures in Electronic Voting Systems
Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.
More informationSecurity Assets in E-Voting
Security Assets in E-Voting Alexander Prosser, Robert Kofler, Robert Krimmer, Martin Karl Unger Institute for Information Processing, Information Business and Process Management Department Production Management
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationElectronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)
Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationRemote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationL9. Electronic Voting
L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More informationA paramount concern in elections is how to regularly ensure that the vote count is accurate.
Citizens Audit: A Fully Transparent Voting Strategy Version 2.0b, 1/3/08 http://e-grapevine.org/citizensaudit.htm http://e-grapevine.org/citizensaudit.pdf http://e-grapevine.org/citizensaudit.doc We welcome
More informationA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION Manabu Okamoto 1 1 Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi, Kanagawa 243-0292, Japan manabu@nw.kanagawa-it.ac.jp ABSTRACT
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and
More informationInternet Voting: Experiences From Five Elections in Estonia
Internet Voting: Experiences From Five Elections in Estonia Priit Vinkel Estonia Abstract: Estonia has been one of the pioneers of Internet Voting by introducing Internet Voting in binding elections in
More informationAn Introduction to Cryptographic Voting Systems
Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic
More informationNevada Republican Party
RESOLUTION # R-104 TO AMEND THE STANDING RULES OF THE NEVADA REPUBLICAN CENTRAL COMMITTEE Summary A resolution to adopt Standing Rules governing the Presidential Preference Poll. A RESOLUTION TO ADOPT
More informationBiometrics in Border Management Grand Challenges for Security, Identity and Privacy
Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,
More informationCuyahoga County Board of Elections
Cuyahoga County Board of Elections Hearing on the EVEREST Review of Ohio s Voting Systems and Secretary of State Brunner s Related Recommendations for Cuyahoga County Comment of Lawrence D. Norden Director
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationThe problems with a paper based voting
The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand
More informationThoughts On Appropriate Technologies for Voting
Thoughts On Appropriate Technologies for Voting Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Princeton CITP E-voting Workshop 2012-11-01 Is Voting Keeping Up with Technology? We live in
More informationCALTECH/MIT VOTING TECHNOLOGY PROJECT A
CALTECH/MIT VOTING TECHNOLOGY PROJECT A multi-disciplinary, collaborative project of the California Institute of Technology Pasadena, California 91125 and the Massachusetts Institute of Technology Cambridge,
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationE-Voting Systems Security Issues
E-Voting Systems Security Issues 1 Abdalla Al-Ameen, 2 Samani A. Talab 1, Deanship of the Preparatory Year,Al Jouf University, Al Jouf, Kingdom of Saudi Arabia, Abda711_su@hotmail.com *2, Department of
More informationSmart Voting System using UIDAI
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student
More informationL14. Electronic Voting
L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the
More informationPrêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia
662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,
More informationSTATE OF NEW JERSEY. SENATE, No th LEGISLATURE
SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JANUARY, 0 Sponsored by: Senator NIA H. GILL District (Essex and Passaic) Senator SHIRLEY K. TURNER District (Hunterdon and Mercer) SYNOPSIS Requires
More informationCitizen engagement and compliance with the legal, technical and operational measures in ivoting
Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does
More informationNetvote: A Blockchain Voting Protocol
Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationUser Guide for the electronic voting system
User Guide for the electronic voting system The electronic voting system used by the University of Stavanger, is developed by and for the University of Oslo, but is also used by other institutions (e.g.
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationInternet Voting the Estonian Experience
Internet Voting the Estonian Experience Sven Heiberg sven@cyber.ee Department of Information Security Systems Cybernetica AS Tartu, Estonia Abstract Estonia has offered Internet Voting as a method to participate
More informationARKANSAS SECRETARY OF STATE. Rules on Vote Centers
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are promulgated pursuant
More informationMachine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver
Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in
More informationTO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration
TO: Chair and Members REPORT NO. CS2014-008 Committee of the Whole Operations & Administration FROM: Lori Wolfe, City Clerk, Director of Clerk s Services DATE: 1.0 TYPE OF REPORT CONSENT ITEM [ ] ITEM
More informationWHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?
WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? AVANTE INTERNATIONAL TECHNOLOGY, INC. (www.vote-trakker.com) 70 Washington Road, Princeton Junction, NJ
More informationE-Voting Solutions for Digital Democracy in Knowledge Society
55 Informatica Economică vol. 20, no. 3/2016 E-Voting Solutions for Digital Democracy in Knowledge Society Marian STOICA, Bogdan GHILIC-MICU Department of Economic Informatics and Cybernetics, Bucharest
More informationBIOMETRICS - WHY NOW?
BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services
More information福井大学審査 学位論文 博士 ( 工学 )
福井大学審査 学位論文 博士 ( 工学 A Dissertation Submitted to the University of Fukui for Degree of Doctor of Engineering A Scheme for Electronic Voting Systems 電子投票システムの研究 カジムハマドロキブル Kazi Md. Rokibul アラム Alam 2010
More informationVoting Corruption, or is it? A White Paper by:
Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along
More informationTokenVote: Secured Electronic Voting System in the Cloud
TokenVote: Secured Electronic Voting System in the Cloud Fahad Alsolami Department of Information Technology King Abdulaziz University, KSA Abstract With the spread of democracy around the world, voting
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)
International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to
More informationAdditional Case study UK electoral system
Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament
More informationRecommendations of the Symposium. Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006
Recommendations of the Symposium Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006 1. Basic Principles and Goals While the symposium focused on disability caused by cognitive
More informationSurvey of Fully Verifiable Voting Cryptoschemes
Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project
More informationElectronic Voting. Mohammed Awad. Ernst L. Leiss
Electronic Voting Mohammed Awad Ernst L. Leiss coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors
More informationThe Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez
The Economist Case Study: Blockchain-based Digital Voting System Team UALR Connor Young, Yanyan Li, and Hector Fernandez University of Arkansas at Little Rock Introduction Digital voting has been around
More informationJohns Hopkins University Security Privacy Applied Research Lab
Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631
More informationCity of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013
City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30
More informationELECTION BROCHURE FOR COOPERATIVE ASSOCIATIONS
ELECTION BROCHURE FOR COOPERATIVE ASSOCIATIONS DEPARTMENT OF BUSINESS AND PROFESSIONAL REGULATION Division of Florida Condominiums, Timeshares, and Mobile Homes 1940 North Monroe Street Tallahassee, Florida
More informationNevada Republican Party
STANDING RULES OF THE NEVADA REPUBLICAN CENTRAL COMMITTEE TABLE OF CONTENTS CHAPTER ONE BASIC RULES CHAPTER TWO PRESIDENTIAL PREFERENCE POLL RULES CHAPTER THREE DELEGATE BINDING RULES HISTORY OF AMENDMENTS
More informationElectronic Voting in Belgium Past, Today and Future
Electronic Voting in Belgium Past, Today and Future Danny De Cock K.U.Leuven ESAT/COSIC Slides available from http://godot.be/slides Electronic Voting in Belgium: Past, Today and Future 1 Outline Classic
More informationOn Some Incompatible Properties of Voting Schemes
This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties
More informationFormal Verification of Selene with the Tamarin prover
Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with
More informationARKANSAS SECRETARY OF STATE
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 Revised April 6, 2018 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are
More informationVoting Systems: From Art to Science 1RWH
1 Voting Systems: From Art to Science Voting Technology Conference 2001 Pasadena, Calif., March 30-31 31 Caltech/MIT Ed Gerck, Ph.D. egerck@safevote safevote.com CEO & VP of Technology 1 1RWH 7KLVSUHVHQWDWLRQGHDOVZLWKDJHQHUDOPRGHOIRUYRWLQJXVLQJ
More informationPrivacy Issues in an Electronic Voting Machine
Privacy Issues in an Arthur M. Keller UC Santa Cruz and Open Voting Consortium David Mertz Gnosis Software Joseph Lorenzo Hall UC Berkeley Arnold Urken Stevens Institute of Technology Outline Secret ballot
More informationElectronic Document and Electronic Signature Act Published SG 34/6 April 2001, effective 7 October 2001, amended SG 112/29 December 2001, effective 5
Electronic Document and Electronic Signature Act Published SG 34/6 April 2001, effective 7 October 2001, amended SG 112/29 December 2001, effective 5 February 2002, SG 30/11 April 2006, effective 12 July
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More information