Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.
|
|
- Gabriel Gibson
- 5 years ago
- Views:
Transcription
1 PAPER ID: IJIFR/V1/E4/019 ISSN (Online): Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer science Pacific University, Udaipur 2 Research Supervisor & Associate Professor Department of Computer Science MJP University, Bareilly Abstract Voting machines are useful tools built to improve the election process. They are combination of mechanical, electromechanical, electronic and software components working together in order to define ballots, cast and count votes, report eventually errors, report finals results and guarantee the safety, the privacy and the security of each polling. In e- voting system, several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabilities to network threats, and poor software development processes have been identified. We conclude that this voting system is unsuitable for use in a general election. Any paperless electronic voting system might suffer similar flaws, despite any certification it could have otherwise received. It has been suggested that the best solutions are voting systems having a voter verifiable audit trail, where a computerized voting system might print a paper ballot that can be read and verified by the voter. Key Words: E-Voting System, Cryptography, Voter Verified Ballot, Security, Accuracy, Audit Trail 1 Introduction E-voting has been introduced prematurely to national elections in many countries worldwide. There are technical and organizational barriers which must be resolved before the use of e-voting can be recommended in such a critical context. Two fundamental requirements for e-voting systems are: ballot secrecy and accuracy. We describe the nature and implications of these facts, and examine the two main categories of proposed solutions: cryptographic voting schemes, and Voter Verified Ballot Test (VVBT). We emphasize "minimize". Eliminating problems with electronic voting machines is no more possible than with pen and paper, or other means. The proper test is whether the use of electronic voting systems introduces more vulnerability that cannot be remediated. Consider the nature of an election process that uses electronic voting systems. Essentially, the process must manage the flow of ballots from a point of origin to a system on which a voter casts her votes, and then to a tallying mechanism that counts the votes. At any point *except* when the voter is making her selections, the process must be observable, as is a process that uses paper and pencil. We adopt this view to study the design of an election that uses electronic voting systems. [1, 2] The properties that an election process must meet are many. We focus on a few key properties: Integrity: Ballots cannot be changed once cast and results are reported as determined. ijifr.journal@gmail.com, editors@ijifr.com IJIFR This paper is available online at - ID: IJIFR/V1/E3/019
2 Accuracy of the tally: All valid votes are counted, and all invalid votes are discarded. here, "valid" and "invalid" mean conforming and not conforming to the laws governing legal ballot markings or representations. Secrecy of the ballot: No voter may be able to prove to another party how she voted. This prevents vote selling. Anonymity of the ballot: No party may determine how a voter voted. This prevents an unscrupulous party from forcing a voter to vote in a particular way.[3,4] 2 Research background According to data published on VerifiedVoting.org [5], few years later some Security Teams (UC Red Team, Stanford University, Johns Hopkins, ect.) [6, 7] tested the security of most common Voting machines. In the meantime despite industry tries claims that the problems reported by VerifiedVting.org have any effect on the past presidential race; but the security test result has been deleterious. The most popular Electronic Voting machine: Direct Recording Electronic (DRE) built by Sequoia Pacific, was vulnerable to at least 120 potential attacks[8] which an attacker could compromise each e-voting Machine. ADRE is an electronic machine able to collect ballots. It uses a large display (typically a touch screen) to visualize the ballot, a touch screen monitor or a buttons set to collect the votes and smart software to record them. The whole machine is covered from a resistant anti-shock case and protected by battery backup in order to prevent crashes and power loss. At the end of elections it produces a tabulation of data collected in a removable smart card and a printed copy[9] in order to verify an eventually smart card data manipulations. Companies put a lot of confidence in these few security levels forgetting the capabilities of attackers who can easily compromise the memory card integrity and/or install a malware inside DRE before voting has been started. Can we be sure that Machines software has recorded the correct ballot? Can we be sure that none could vote more than one time? These questions are useful to emphasize some of the most important sets of problems that literature has depicted [8, 10] 1. Insertion of Corrupt Software 2. Wireless and Remote Control 3. Tally Server counting 4. Calibration of the Machine 5. Shut Off Voting Machine Features Intended to assist Voters 6. Denial of Service 7. Actions by corrupt Poll Workers or Others at the Polling Place to affect Votes 8. Vote-Buying Schemes 9. Attacks on Ballots or VVPT 10. Unauthorized privilege escalation 11. Incorrect use of Cryptography 3 Research Objectives & Key Question The Internet voting system descriptions presented in this discussion are based on systems in use elsewhere. They are used in this section as a backdrop against which issues raised can be compared and contrasted. This paper is concerned with the vote collection and tabulation phases of the electoral 42
3 process. While other aspects of the electoral process have seen the introduction of technology, and may be fruitful areas for research, we chose to focus on e-voting: the use of technology to collect and count votes. Despite the variety of ways in which modern democracies implement elections, the following high-level view of the electoral process applies almost (if not actually) universally. Voter Registration: a list of eligible voters must be kept so that voting can be restricted to only eligible voters. Voter Authentication: when a person attempts to cast a vote, they must be authenticated against the list mentioned above. Vote Collection: the votes of authenticated eligible voters must be recorded in a way which preserves secret program. Vote Tabulation: results must be calculated based on the votes cast by authenticated eligible voters according to the appropriate algorithm. The first question that we identified is the requirements for secrecy and accuracy in online e-voting system. The sub question here could be phrased: What solutions have been proposed to provide secrecy-accuracy in online e-voting system? What is the nature of the e-voting itself? What are the consequences for e-voting specifically (as opposed to traditional paper-only elections), especially in dealing with fraud, error and usability issues? What solutions to these problems may propose, and how do they design the system? The third and most important sub-question encompasses the majority of the technical work of the thesis: Are there deficiencies in existing specifications of requirements for e-voting systems in critical elections? What can be done to address any such deficiencies?" What requirements catalogues exist? Are there any international standards? How suitable are such catalogues for the design, development and testing of e-voting systems? If we were to propose a new catalogue of requirements for e-voting for critical elections, what requirements would we include? 4 Research Issues and Proposals The voting system that exists in developing countries like India right now it is completely paper based that is from gathering the voter details to voting everything are done by hand and all kind of data are written on paper, so there are lots of chances of mistakes and corruption. People become voter in two different areas if people change their residence and become voter in the new area. People can even vote for multiple times because the way the authority follows to make sure a single vote for a single person is really an old style. In this section, we have analysed different issues that need to be taken care before implementation the system. The main issues discussed and some proposals are prepared to design the proposed system. The main issues covered in this section for proposed system are: 4.1 Voting Machine Database maintenance efficiency In e-voting system database is mainly divided into two parts. Those are population database and voter database. After entering all existing people in the data base, system will collect new entry 43
4 from the medical officer. New entry may be comes from Voting Ministry. All these entry will preserve at population database. Population database has two segments one is primary database and the other one is secondary database. Primary database keeps the record of that part of population whose age is between 0 to less than 18 years. But still he/she will not be a voter until his/her finger print is not given to the authority, which can be collected for UID database. If anyone dies, his /her record will remain in the population database but, their status will be dead. It goes for both of the databases of whose age are 0 to less than 18 and over 18 years. When the election comes the people who are voter, their record upgrade from population database to voter database. At that time this database will distribute the voter list according to their area Id. This will happen only at voting period. Otherwise rest of the time all the data will preserve in a single voter database, the voter list only distribute at voting period. 4.2 User or Voter Fingerprint matching Most efficient and effective part of this system is fingerprint. Fingerprint is a unique identification for any voter. All the information about voter will be preserve against the fingerprint. At the registration period when anyone gives his/her information the system will generate an Id against that information. This Id will be protected by his/her fingerprint. If anyone tries to make double entry in the voter database he/she cannot make that because of fingerprint. So the system makes ensure single entry for individual. The system will not transfer the entry until his/her fingerprint provided. No one can change others information only because of fingerprint. Even administrator cannot modify others information. So all the information will be strongly preserve in the database. In this system the administrator can only excess the data he/she cannot modify anything only because of fingerprint. 4.3 Network issues as system is online A three tiered network system has been proposed here for implementation of this electronic voting system. There will be a number of clients in the most root level that is it may be in Police Station level or sub-district level of a country. But it is necessary to have a lot of clients in the root level. Some clients together make a cluster. The cluster size should between 10 to 15 clients. In the district level there will be a dedicated application server for those police station or sub-district clients under that district. These application servers in this level won t accept packets from any other cluster under another application server. In the division level there will be some dispatcher for each division. These dispatchers will also be dedicated for those districts under that division. There will be a layer of application server layer after the dispatcher through which the dispatcher will pass the encrypted vote to the main database. 4.4 Encryption and decryption for security Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authorized to use. Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone. Secrecy has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. There are various types of encrypting and decrypting algorithm. Substitutions ciphers, transposition ciphers, One-time pads, Quantum cryptography, Symmetric, 44
5 Asymmetric these are some algorithms. By using these types of algorithm any network system can be secured. 5 Changing the electoral process India uses electronic voting machines in voting places, but has not adopted online voting at the national level. India s Unique Identification Authority is laying the groundwork for online authentication for government services by issuing unique identification numbers to all Indian residents. The Authority began issuing identification numbers in 2010 and plans to issue 600 million numbers through its network of registrar offices located throughout the country by 2015 (Unique Identification Authority of India, 2011). Implementing Internet voting would require extensive revisions to long-established procedures for voting, counting, monitoring and auditing. It is critical that the general public trusts the security of new voting and counting processes and their ability to deliver a result that is a true and accurate reflection of their will as expressed through the voting process. If Internet voting is not trusted, voters may not accept the legitimacy of the elected members to govern. It is, therefore, very important that trade-offs among electoral principles are considered carefully. This section assesses Internet voting with respect to seven principles of democratic elections. In so doing, it describes some of the challenges presented by Internet voting, trade-offs that may be needed among electoral principles, and best practices that have emerged from implementations of Internet voting in public elections. Accessibility Equal voting power Secrecy Security Auditability Transparency Simplicity 6 Propose System Overview Wide area network will be used to design the whole network system. There will be both radio linked and optical fibre network. There will be one client server and three application server. From all the client servers to the application servers there will be radio linked network as the client server will be busy just in sending the encrypted votes to one of the application server through some other application server. The third application server will send them again to the main database through another application server. There will be optical fibre connection between the second application server to the third application server and from third to the main database. The e-voting system proposed here have been decomposed into several functions. The function specifies what the system does by describing its work. What inputs are fetched to the system, what outputs are produced and data manipulation performed by the system. It is better idea to divide the systems into some sub systems to have a better managed software development also improves reusable capability and make easier for maintenance. Each sub-system will have a well-defined interface with respect to the rest of the system. 45
6 Figure1: Network model for e-voting Following problems are overcome using the computerize e voting system. System will replace the manual record keeping system by computerize system. System will reduce the chances of error occurrence, while calculation. System will minimize time being consumed. System will increase security of votes. System will not allow chance of rejection of vote. System will do easy management of records. System wills easy searching of desire record. System will do online polling. To know easily whether the voter is registered or not. High and reliable security can be achieved. Insertion sort algorithm is also one of oldest, easiest and most useful sorting algorithms for dealing with modicum of data set. If the first few objects are already sorted, an unsorted object can be inserted in the sorted set in proper place 7 Conclusion In this paper, we proposed to introduce a new voting system that will be accurate, transparent, and faster and will ensure a single vote for a single person. Our proposed system has covered all of these issues successfully. Moreover this system will provide boundary less voting. A better database maintenance, automated registration system and the process of casting vote using finger print will further help us to fulfil our purpose. Based on the design principles and requirement, a prototype of the system for E-voting System has been proposed by the researchers and developed. The using of electronic voting has the potential to reduce or remove unwanted human errors. In addition to its reliability, e-voting can handle multiple modalities, and provide better scalability for large elections. E-Voting is also an excellent mechanism that does not require geographical proximity of the voters. 46
7 8 References [1] Ansper, A., Heiberg, S., Lipmaa, H., Overland, T. A., & van Laenen, F. (2011). Security and Trust for the Norwegian E-voting Pilot Project. Oslo: Ministry of Local Government and Regional Development. [2] Barnes, E. (2010, November 1). Internet Voting Arrives...But is it Secret and Secure. Retrieved from [3] Beaucamps, P., Reynaud-Plantey, D., Marion, J.-Y., & Filiol, E. (2009). On the use of Internet Voting on Compromised Computers. Rennes: Equipe Carte-Loria and Army Signals Academy Virology and Cryptology Laboratory. [4] Benaloh, J. (2008, July ). Ensure Election Accuracy. Tech-Net Magazine. Retrieved from [5] Bochsler, D. (2010). Can Internet voting increase political participation? Remote electronic voting and turnout in Estonian 2007 parliamentary elections. Central European University, Budapest: Centre for the Study of Imperfections in Democracies. [6] California Internet Voting Task Force. (2000, January 18). Technical Committee Recommendations. Retrieved from: a5.html [7] Puiggali, J., Choliz, J., & Guasch, S. (2010, August 3). Best Practices in Internet Voting. Retrieved from: _BestPracticesInternetVoting.pdf [8] Schryen, G., & Rich, E. (2009, July 17). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. Retrieved from: Schryen%20Rich%20-%20Security%20in%20Large- Scale%20Internet%20 Elections%20-%20IEEE%20Transactions.pdf [9] Unique Identification Authority of India. (2011). Background. Retrieved from: uidai.gov.in/index.php?option=com_content&view=article&id=141&itemid=164 Verified Voting. (2011, May 23). Internet Voting in India? Gujarat is the Early Adopter. Retrieved from: gujarat-is-the-early-adopterplugged-in/ [10] Zetter, K. (2010, October 6). Hacked Voting System Stored Accessible Password, Encryption Key. Retrieved from: hacked/ [11] Verification for Electronic Balloting Systems," Rebecca T. Mercuri and Peter G. Neumann, Chapter 3, Secure Electronic Voting, Dimitris Gritzalis, ed., Advances in Information Security, Volume 7, Kluwer Academic Publishers, Boston, November ISBN [12] EETimes, Computer experts renew call for secure evoting ml?articleid=
CHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationL9. Electronic Voting
L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationE-Voting, a technical perspective
E-Voting, a technical perspective Dhaval Patel 04IT6006 School of Information Technology, IIT KGP 2/2/2005 patelc@sit.iitkgp.ernet.in 1 Seminar on E - Voting Seminar on E - Voting Table of contents E -
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationStatement on Security & Auditability
Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationARKANSAS SECRETARY OF STATE
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 Revised April 6, 2018 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are
More informationWHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?
WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? AVANTE INTERNATIONAL TECHNOLOGY, INC. (www.vote-trakker.com) 70 Washington Road, Princeton Junction, NJ
More informationVolume I Appendix A. Table of Contents
Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationARKANSAS SECRETARY OF STATE. Rules on Vote Centers
ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are promulgated pursuant
More informationSmart Voting System using UIDAI
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student
More informationThe E-voting Controversy: What are the Risks?
Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationInternet Voting the Estonian Experience
Internet Voting the Estonian Experience Sven Heiberg sven@cyber.ee Department of Information Security Systems Cybernetica AS Tartu, Estonia Abstract Estonia has offered Internet Voting as a method to participate
More informationA paramount concern in elections is how to regularly ensure that the vote count is accurate.
Citizens Audit: A Fully Transparent Voting Strategy Version 2.0b, 1/3/08 http://e-grapevine.org/citizensaudit.htm http://e-grapevine.org/citizensaudit.pdf http://e-grapevine.org/citizensaudit.doc We welcome
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationElectronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)
Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department
More informationElectronic Voting in Belgium Past, Today and Future
Electronic Voting in Belgium Past, Today and Future Danny De Cock K.U.Leuven ESAT/COSIC Slides available from http://godot.be/slides Electronic Voting in Belgium: Past, Today and Future 1 Outline Classic
More informationTO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration
TO: Chair and Members REPORT NO. CS2014-008 Committee of the Whole Operations & Administration FROM: Lori Wolfe, City Clerk, Director of Clerk s Services DATE: 1.0 TYPE OF REPORT CONSENT ITEM [ ] ITEM
More informationOffice for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING
Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING Warsaw 24 October 2008 TABLE OF CONTENTS I. INTRODUCTION...
More informationDirect Recording Electronic Voting Machines
Direct Recording Electronic Voting Machines This Act sets standards for direct recording electronic voting machines (DREs). As of July 1, 2005, DREs must, among other things: produce a voter-verified paper
More informationThe problems with a paper based voting
The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand
More informationCity of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013
City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationResponse to the Scottish Government s Consultation on Electoral Reform
Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation
More informationM-Polling with QR-Code Scanning and Verification
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech
More informationSEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE
SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE STUDENT NAME: Adrian Dulaj STUDENT NUMBER: 09 336 595 COURSE NAME: Masters in European Business DEPARTMENT: Department of SES
More informationSMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:
SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationOnline Voting System Using Aadhar Card and Biometric
Online Voting System Using Aadhar Card and Biometric Nishigandha C 1, Nikhil P 2, Suman P 3, Vinayak G 4, Prof. Vishal D 5 BE Student, Department of Computer Science & Engineering, Kle s KLE College of,
More informationEvery electronic device used in elections operates and interacts
MONITORING ELECTRONIC TECHNOLOGIES IN ELECTORAL PROCESSES 13 CHAPTER TWO: Introduction to Electronic Technologies in Elections INTRODUCTION Every electronic device used in elections operates and interacts
More informationVOTERGA SAFE COMMISSION RECOMMENDATIONS
VOTERGA SAFE COMMISSION RECOMMENDATIONS Recommended Objectives, Proposed Requirements, Legislative Suggestions with Legislative Appendices This document provides minimal objectives, requirements and legislative
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More informationFULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF
FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationChief Electoral Officer Directives for the Counting of Ballots (Elections Act, R.S.N.B. 1973, c.e-3, ss.5.2(1), s.87.63, 87.64, 91.1, and 91.
Chief Electoral Officer Directives for the Counting of Ballots (Elections Act, R.S.N.B. 1973, c.e-3, ss.5.2(1), s.87.63, 87.64, 91.1, and 91.2) P 01 403 (2016-09-01) BALLOT COUNT USING TABULATION MACHINES
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationElectronic Voting Machine Information Sheet
Name / Model: eslate 3000 1 Vendor: Hart InterCivic, Inc. Voter-Verifiable Paper Trail Capability: Yes Brief Description: Hart InterCivic's eslate is a multilingual voter-activated electronic voting system
More informationNevada Republican Party
RESOLUTION # R-104 TO AMEND THE STANDING RULES OF THE NEVADA REPUBLICAN CENTRAL COMMITTEE Summary A resolution to adopt Standing Rules governing the Presidential Preference Poll. A RESOLUTION TO ADOPT
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationUncovering the veil on Geneva s internet voting solution
Uncovering the veil on Geneva s internet voting solution The Swiss democratic semi-direct system enables citizens to vote on any law adopted by any authority (communal, cantonal or federal) and to propose
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationSMS based Voting System
IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationDIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY
DIRECTIVE 2012-56 November 20, 2012 To: Re: All County Boards of Elections Directors, Deputy Directors, and Board Members Post-Election Audits SUMMARY In 2009, the previous administration entered into
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationThe Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going
The Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going Suad Arnautović BiH Central Election Commission, Sarajevo, Bosnia and Herzegovina Introduction
More informationBrittle and Resilient Verifiable Voting Systems
Brittle and Resilient Verifiable Voting Systems Philip B. Stark Department of Statistics University of California, Berkeley Verifiable Voting Schemes Workshop: from Theory to Practice Interdisciplinary
More informationThe Use of New Voting Technologies (NVT)
osce.org/odihr/elections Elections RK 22.10.2013 The Use of New Voting Technologies (NVT) Comparative Experiences in the Implementation of Electronic Voting Lima, Peru Presumably the voting machine does
More informationAct means the Municipal Elections Act, 1996, c. 32 as amended;
The Corporation of the City of Brantford 2018 Municipal Election Procedure for use of the Automated Tabulator System and Online Voting System (Pursuant to section 42(3) of the Municipal Elections Act,
More informationDESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationAdditional Case study UK electoral system
Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament
More information14 Managing Split Precincts
14 Managing Split Precincts Contents 14 Managing Split Precincts... 1 14.1 Overview... 1 14.2 Defining Split Precincts... 1 14.3 How Split Precincts are Created... 2 14.4 Managing Split Precincts In General...
More informationProcedures for the Use of Optical Scan Vote Tabulators
Procedures for the Use of Optical Scan Vote Tabulators (Revised December 4, 2017) CONTENTS Purpose... 2 Application. 2 Exceptions. 2 Authority. 2 Definitions.. 3 Designations.. 4 Election Materials. 4
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationANTI FRAUD MEASURES. Principles
ANTI FRAUD MEASURES The Independent Election Commission of Afghanistan is implementing a number of anti fraud measures to protect the integrity of the election process and ensure that election results
More informationE-Poll Books: The Next Certification Frontier
E-Poll Books: The Next Certification Frontier Jay Bagga, Joseph Losco, Raymond Scheele Voting Systems Technical Oversight Program (VSTOP) Ball State University Muncie, Indiana Outline New Indiana legislation
More informationImplementation of aadhar based voting machine using
ISSN:2348-2079 Volume-6 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Implementation of aadhar based voting machine using arduino with GSM Dr.POONGODI.S
More informationGlobal Conditions (applies to all components):
Conditions for Use ES&S The Testing Board would also recommend the following conditions for use of the voting system. These conditions are required to be in place should the Secretary approve for certification
More informationIC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes
IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,
More informationCitizen engagement and compliance with the legal, technical and operational measures in ivoting
Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does
More informationEXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering,
EJISDC (2005) 22, 5, 1-9 EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN Mohsen Kahani (kahani@um.ac.ir) Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran Abstract Electronic
More informationE-Voting Solutions for Digital Democracy in Knowledge Society
55 Informatica Economică vol. 20, no. 3/2016 E-Voting Solutions for Digital Democracy in Knowledge Society Marian STOICA, Bogdan GHILIC-MICU Department of Economic Informatics and Cybernetics, Bucharest
More informationTroubleshooting Manual
Registrar of Voters County of Santa Clara Troubleshooting Manual Election Day Procedure Booklet Contact 1(408) 299-POLL (7655) with any questions or additional problems. Remember to note any troubleshooting
More informationRunning head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams
Running head: ROCK THE BLOCKCHAIN 1 Rock the Blockchain: Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams University of Maryland University College (UMUC) Author Note Thanks to our UMUC
More informationFAQ s Voting Method & Appropriateness to PICC Elections
Purley Masjid, 63 Whytecliffe Road South, Purley, CR8 2AZ E-mail: info@purleyicc.com Purley Islamic Community Centre Registered in England Registration No.: 06902369 Registered Charity No.: 1146668 FAQ
More informationA Study on Ways to Apply the Blockchain-based Online Voting System 1
, pp.121-130 http//dx.doi.org/10.14257/ijca.2017.10.12.11 A Study on Ways to Apply the Blockchain-based Online Voting System 1 Hye Ri Kim 1, Kyoungsik Min 2,* and Seng-phil Hong 3 1 Dept. of Computer Science,
More informationOCSE Vienna 17/ Open Source Remote Electronic Voting in Norway
OCSE Vienna 17/9 2010 Open Source Remote Electronic Voting in Norway Project Manager Henrik Nore The Ministry of Local Government and Regional Development Project scope Why internet voting increase availability
More informationComputer Security Versus the Public's Right to Know
Computer Security Versus the Public's Right to Know by Douglas W. Jones * University of Iowa jones@cs.uiowa.edu Notes for a panel discussion on Electronic Voting Integrity Computers, Freedom and Privacy
More informationCuyahoga County Board of Elections
Cuyahoga County Board of Elections Hearing on the EVEREST Review of Ohio s Voting Systems and Secretary of State Brunner s Related Recommendations for Cuyahoga County Comment of Lawrence D. Norden Director
More informationUser Guide for the electronic voting system
User Guide for the electronic voting system The electronic voting system used by the University of Stavanger, is developed by and for the University of Oslo, but is also used by other institutions (e.g.
More informationIN-POLL TABULATOR PROCEDURES
IN-POLL TABULATOR PROCEDURES City of London 2018 Municipal Election Page 1 of 32 Table of Contents 1. DEFINITIONS...3 2. APPLICATION OF THIS PROCEDURE...7 3. ELECTION OFFICIALS...8 4. VOTING SUBDIVISIONS...8
More informationAFFIDAVIT OF POORVI L. VORA. 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George
AFFIDAVIT OF POORVI L. VORA POORVI L. VORA, being duly sworn, deposes and says the following under penalty of perjury: 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George Washington
More informationNovel E-Voting System with Biometric Authentication and Distributed Server System
Novel E-Voting System with Biometric Authentication and Distributed Server System PP Shendage *, PC Bhaskar Department of Technology, Shivaji University, Kolhapur, Maharashtra, India E-mail: shendagepriyanka1@gmail.com
More informationAadhaar Based Voting System Using Android Application
Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,
More informationDemocracy depends on losers accepting the results
Election Security: Perception and Reality Voters trust in elections comes from a combination of the mechanisms and procedures we use to record and tally votes, and their confidence in election officials
More informationPROCEDURES FOR THE USE OF VOTE COUNT TABULATORS
2018 MUNICIPAL ELECTION OCTOBER 22, 2018 PROCEDURES FOR THE USE OF VOTE COUNT TABULATORS OLGA SMITH, CITY CLERK FOR INFORMATION OR ASSISTANCE, PLEASE CONTACT ONE OF THE FOLLOWING: Samantha Belletti, Election
More informationMUNICIPAL ELECTIONS 2014 Voting Day Procedures & Procedures for the Use of Vote Tabulators
1. INTRODUCTION MUNICIPAL ELECTIONS 2014 Voting Day Procedures & Procedures for the Use of Vote Tabulators 1.1. This procedure has been prepared and is being provided to all nominated candidates pursuant
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationE-Voting Within The E-Government System
E-Voting Within The E-Government System MAHA SABRI ALTEMEME Dept. computer-scientific college Kerbala University Kerbala, Iraq maha.sabri@uokerbala.edu.iq Abstract With a rapid growth in computer networks,
More informationInternet Voting: Experiences From Five Elections in Estonia
Internet Voting: Experiences From Five Elections in Estonia Priit Vinkel Estonia Abstract: Estonia has been one of the pioneers of Internet Voting by introducing Internet Voting in binding elections in
More informationAADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER
AADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER Ravindra Mishra 1, Shildarshi Bagde 2, Tushar Sukhdeve 3, Prof. J. Shelke 4, Prof. S. Rout 5, Prof. S. Sahastrabuddhe 6 1, 2, 3 Student, Department
More information