Secure Voter Registration and Eligibility Checking for Nigerian Elections
|
|
- Roland Austin
- 6 years ago
- Views:
Transcription
1 Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
2 Introduction Over the last decade, a number of countries have adopted different techniques to accurately identify eligible voters and increase democratic participation among their citizens during legally binding elections. On the one hand, biometric identification cards have been the most commonly used technique for identifying eligible voters during elections. Typical examples include the Belgian and Estonian national ID cards, as well as the Nigerian biometric voter cards, amongst others. On the other hand, voters have also been identified through mobile phones embedded with special SIM cards. A very common example is the Mobile-ID system used in Estonia for Internet voting. Image credits:
3 Research Motivation Accurate identification of eligible voters is a fundamental requirement in election administration. The majority of electronic voting schemes that have been proposed in the cryptographic literature have been designed specifically to prevent electoral fraud during the ballot casting phase of elections in developed countries. While these schemes and their various extensions claim to provide receiptfreeness and end-to-end verifiability, none of them effectively counter coercion. In addition, these voting schemes typically assume that the computer/ smartphones used by voters to cast their vote is trustworthy. Evidently, this assumption is rather naïve, because a voter s device might be infected by a malware that could manipulate votes, subvert a voting session or even execute denial-of-service and replay attacks intended to disenfranchise a certain group of voters.
4 Problems with Voter Identification in Nigeria Unavailability of a secure and reliable national ID infrastructure. Relative ease with which biometric voter cards can be forged or stolen. Coercion of voters to sell or voluntarily relinquish their voter cards. Security vulnerabilities in biometric voter card readers. Inaccurate and incomplete voter register. Ineffective and uncoordinated distribution of voter cards to remote areas. Poor quality of biometric data captured and stored in biometric voter cards. Undocumented collection of biometric voter cards by proxies. Dishonest polling officials colluding to allow ineligible voters to vote.
5 Research Objectives The primary aim of this research is to investigate how we could improve the integrity of the voter identification process in Nigeria. To accomplish this, we will explore the techniques that can be used to design a provably secure and verifiable cryptographic protocol that will uniquely identify voters in the presence of malicious adversaries and colluding polling officials. In addition, we will investigate how we can reduce the incidences of voter coercion during the voter registration and eligibility checking phases on election day. Once we have a fully functional protocol, we will formally verify the protocol in order to assess its overall security and performance. We are also considering the implementation of a voter identification system that can be used to evaluate the usability of the protocol.
6 Related Work
7 Progress made so far We have been able formulate the security properties and trust assumptions of the cryptographic protocol. In addition, we have outlined the protocol s adversarial model. In doing so, we have now reasonably specified the following: How an adversary will try to subvert the protocol's functionality. The potential attacks that can be launched against the protocol. A list of the goals, capabilities and possible limitations of each adversary. The security, trust and privacy implications of each adversary s influence on the protocol s functionality. At the moment, we are currently working on the high-level security proofs that will form the basis of the key security properties of the protocol s specification, notably receipt-freeness and participation privacy.
8 Security Requirements of the Protocol Eligibility: Only registered voters may vote. A voter can attempt to verify their identity at most once. After this attempt, the polling place officials have to be contacted to resolve any discrepancies. Individual verifiability: Each voter should be able to check that their voter ID has been accurately recorded on the bulletin board. Universal verifiability: The final list of eligible voters should be verifiable by any third party. Accuracy (Integrity): The announced list of eligible voters should reflect the true count of all legitimate voters. Participation privacy: The protocol should not disclose any information that will give a passive adversary the opportunity to know that an individual voter has participated in the election.
9 Security Requirements of the Protocol (contd.) Receipt-freeness: A voter should not be able to prove that they have verified their identity and subsequently voted. Coercion resistance: All voters should be able to verify their true identity and cast their ballot, even while appearing to cooperate with the coercer. Robustness: The protocol should be able to deliver the correct results even in the event of certain, suitably defined levels of failure or compromise. Availability: All eligible voters should be able to access all features of a fullyfunctioning voter registration system during the election. Vote secrecy: An adversary should not be able to know whether a particular voter has registered to vote at the polling place, based on the publicly available information on the bulletin board. From the viewpoint of the users of electronic voting systems, a major concern is whether the privacy claims of these systems can be trusted.
10 Components of the Protocol
11 Message Sequence Chart of the Protocol
12 How to Verify the Protocol s Security Formal analysis will be used to evaluate the possibility of adversarial attacks on the protocol s specification while formal verification will be used to verify the correctness of the protocol s specification and our security proofs. Moreover, since our protocol involves the use of the Fiat-Shamir heuristic, the security of all aspects of the protocol will be proven in a computationally-sound sense.
13 Contribution to Knowledge Upon successful completion, our main deliverable will be a provably secure and verifiable cryptographic protocol for voter registration and eligibility checking in Nigerian elections. With this protocol, we aim to: Reduce voter coercion, impersonation and disenfranchisement. Significantly reduce electoral fraud due to multiple voting. Disincentivise the collusion of political party representatives and election officials' to collectively subvert the electoral process. As the problems pertaining to the voter identification process in Nigeria resonates across a number of countries like Argentina, Brazil, Columbia and India, amongst others, it is envisaged that this research will provide a viable solution that can be studied to understand how to minimize voter coercion and electoral fraud during the voter registration and eligibility checking phases of elections in developing countries.
14 Questions?
15 References 1. A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria VA, USA, 7-10 November 2005, pp M.R. Clarkson, S. Chong, and A.C. Myers. Civitas: toward a secure voting system. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland CA, USA, May 2008, pp S. Bursuc, G.S. Grewal, and M.D. Ryan. Trivitas: voters directly verifying votes. In: Proceedings of the 2011 International Conference on E-Voting and Identity (VOTE-ID2011),Talinn, Estonia, September 2011, pp B. Adida. Helios: web-based open-audit voting. In: Proceedings of the 17th USENIX Security Symposium, San Jose CA, USA, 28 July-1 August 2008, pp G.S. Grewal et al. Du-Vote: remote electronic voting with untrusted computers. In: Proceedings of the 28th Computer Security Foundations Symposium, Verona, Italy, July 2015, pp
SECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationarxiv: v3 [cs.cr] 3 Nov 2018
Exploiting re-voting in the Helios election system Maxime Meyer a, Ben Smyth b arxiv:1612.04099v3 [cs.cr] 3 Nov 2018 Abstract a Vade Secure Technology Inc., Montreal, Canada b Interdisciplinary Centre
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationRemote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationElectronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)
Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More information(c) In addition to complying with the terms of the CPS, Company shall comply with each of the following obligations:
True Credentials for Code Signing Subscriber Agreement This GeoTrust True Credentials(tm) for Code Signing Subscriber Agreement (this "Agreement") is made by and between GeoTrust, Inc. ("GeoTrust") and
More informationPretty Good Democracy for more expressive voting schemes
Pretty Good Democracy for more expressive voting schemes James Heather 1, Peter Y A Ryan 2, and Vanessa Teague 3 1 Department of Computing, University of Surrey, Guildford, Surrey GU2 7XH, UK j.heather@surrey.ac.uk
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before
More informationStatement on Security & Auditability
Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationDistributed Protocols at the Rescue for Trustworthy Online Voting
Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationExperiences as an e-counting election observer in the UK
Experiences as an e-counting election observer in the UK Photo: Richard Clayton Steven J. Murdoch www.cl.cam.ac.uk/users/sjm217 OpenNet Initiative Computer Laboratory www.opennet.net Workshop on Trustworthy
More informationJosh Benaloh. Senior Cryptographer Microsoft Research
Josh Benaloh Senior Cryptographer Microsoft Research September 6 2018 Findings and Recommendations The election equipment market and certification process are badly broken. We need better ways to incentivize
More informationInternet voting in Estonia
Internet voting in Estonia Ülle Madise member of the National Electoral Committee 4th Quality Conference Tampere 27. 29.09.2006 First Internet voting In October 2005 Estonia had the first pan national
More informationI-A. Voting Systems As Part of Cyber Security Critical Infrastructure.
Developing a Framework to Improve Critical Infrastructure Cybersecurity Under Executive Order 13636 [2] ( Executive Order ), the Secretary of Commerce is tasked to direct the Director of NIST to develop
More informationAn Object-Oriented Framework for Digital Voting
An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo
More informationAn untraceable, universally verifiable voting scheme
An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect
More informationOn Some Incompatible Properties of Voting Schemes
This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties
More informationSurvey on Remote Electronic Voting
Survey on Remote Electronic Voting Alexander Schneider Christian Meter Philipp Hagemeister Heinrich Heine University Düsseldorf firstname.lastname@uni-duesseldorf.de Abstract arxiv:1702.02798v1 [cs.cy]
More informationVolume I Appendix A. Table of Contents
Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image
More informationE-Voting, a technical perspective
E-Voting, a technical perspective Dhaval Patel 04IT6006 School of Information Technology, IIT KGP 2/2/2005 patelc@sit.iitkgp.ernet.in 1 Seminar on E - Voting Seminar on E - Voting Table of contents E -
More informationBlind Signatures in Electronic Voting Systems
Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationAudits: an in-depth review of Venezuela s automatic voting
Audits: an in-depth review of Venezuela s automatic voting Automatic voting is available in the Bolivarian Republic of Venezuela. From the selection of poll workers and members of electoral boards to the
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationReceipt-Free Universally-Verifiable Voting With Everlasting Privacy
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran 1 and Moni Naor 1 Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel Abstract.
More informationJurnal Teknologi A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA. Full Paper. Akintoye Kayode A. a,b*, Araoye, Olalekan I. b
Jurnal Teknologi A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA Akintoye Kayode A. a,b*, Araoye, Olalekan I. b a Dept. of Computer Science, Faculty of Computing Universiti Teknologi Malaysia, Johor Bahru,
More informationTowards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema
Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Dermot Cochran IT University Technical Report Series TR-2015-189 ISSN 1600-6100 August 2015 Copyright 2015,
More informationDESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationIC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes
IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,
More informationA Robust Electronic Voting Scheme Against Side Channel Attack
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 7-86 (06) A Robust Electronic Voting Scheme Against Side Channel Attack YI-NING LIU, WEI GUO HI CHENG HINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi
More informationFormal Verification of Selene with the Tamarin prover
Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with
More informationImproving Electoral Engagement: A Narrative on the Evidence. Tavneet Suri November 5 th 2015
Improving Electoral Engagement: A Narrative on the Evidence Tavneet Suri November 5 th 2015 Democracy Expanding Rapidly Across the World Since 1800 In Africa Governance Remains a Challenge Corruption Safety
More informationTowards One Person, One Vote via Real-Time Voter s Registration and Identification
Towards One Person, One Vote via Real-Time Voter s Registration and Identification B. Isong 1, O. Ekabua 2 and M. Mbodila 3 1 Department of Computer Science and Information Systems, University of Venda,
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.
More informationSubpart A General Provisions
Pt. 11 necessitated such an action within 24 hours or sooner if requested by the Deputy Commissioner. In the absence or unavailability of the Deputy Commissioner, the presiding officer shall notify the
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationANTI FRAUD MEASURES. Principles
ANTI FRAUD MEASURES The Independent Election Commission of Afghanistan is implementing a number of anti fraud measures to protect the integrity of the election process and ensure that election results
More informationHuman readable paper verification of Prêt à Voter
Human readable paper verification of Prêt à Voter David Lundin and Peter Y. A. Ryan d.lundin@surrey.ac.uk, University of Surrey, Guildford, UK peter.ryan@ncl.ac.uk, University of Newcastle upon Tyne, UK
More informationTHE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING Abbas Akkasi 1, Ali Khaleghi 2, Mohammad Jafarabad 3, Hossein Karimi 4, Mohammad Bagher Demideh 5 and Roghayeh
More informationRECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY
RECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY TAL MORAN AND MONI NAOR Abstract. We present the first universally verifiable voting scheme that can be based on a general assumption
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationBIOMETRICS - WHY NOW?
BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services
More informationAct means the Municipal Elections Act, 1996, c. 32 as amended;
The Corporation of the City of Brantford 2018 Municipal Election Procedure for use of the Automated Tabulator System and Online Voting System (Pursuant to section 42(3) of the Municipal Elections Act,
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationUsability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System Fatih Karayumak, Maina M. Olembo, Michaela Kauer and Melanie Volkamer CASED Technische Universität Darmstadt {fatih.karayumak,
More informationOffice for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING
Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING Warsaw 24 October 2008 TABLE OF CONTENTS I. INTRODUCTION...
More information2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting
2018 Municipal Election Policies & Procedures Internet & Telephone Voting pickering.ca Index Authority 01 Definitions 02 Application of Procedures 03 Notice 04 Nomination Papers 05 Unofficial List of Candidates
More informationHAVA- Help America Vote Act of 2002
HAVA- Help America Vote Act of 2002 Presented By: Pennsylvania Department of State Bureau of Commissions, Elections & Legislation 2. Index Introduction pgs. 3-5 HAVA Title III Complaints... pgs. 6-13 Voter
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication
More informationResponse to the Scottish Government s Consultation on Electoral Reform
Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation
More informationSMS based Voting System
IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani
More informationReceipt-Free Homomorphic Elections and Write-in Voter Verified Ballots
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public
More informationEuropean Parliamentary
European Parliamentary election European Parliamentary election on 23 May 2019: guidance for Regional Returning Officers in Great Britain Translations and other formats For information on obtaining this
More informationSecured Electronic Voting Protocol Using Biometric Authentication
Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication
More informationMinistry of Citizenship and Immigration. Follow-Up on VFM Section 3.09, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW
Chapter 1 Section 1.09 Ministry of Citizenship and Immigration Provincial Nominee Program Follow-Up on VFM Section 3.09, 2014 Annual Report RECOMMENDATION STATUS OVERVIEW # of Status of Actions Recommended
More informationL14. Electronic Voting
L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the
More informationMental Voting Booths
Mental Voting Booths Jérôme Dossogne 1 and Frédéric Lafitte 2 1 Université LibredeBruxelles,DepartmentofComputerScience, Boulevard du Triomphe - CP212, 1050 Brussels, Belgium jdossogn@ulb.ac.be 2 Royal
More informationProtocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit
1 Public RLA Oversight Protocol Stephanie Singer and Neal McBurnett, Free & Fair Copyright Stephanie Singer and Neal McBurnett 2018 Version 1.0 One purpose of a Risk-Limiting Tabulation Audit is to improve
More informationThe Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going
The Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going Suad Arnautović BiH Central Election Commission, Sarajevo, Bosnia and Herzegovina Introduction
More informationOnline Voting System Using Aadhar Card and Biometric
Online Voting System Using Aadhar Card and Biometric Nishigandha C 1, Nikhil P 2, Suman P 3, Vinayak G 4, Prof. Vishal D 5 BE Student, Department of Computer Science & Engineering, Kle s KLE College of,
More informationIdentity Documents Act
Issuer: Riigikogu Type: act In force from: 01.09.2013 In force until: 30.04.2014 Translation published: 04.11.2013 Amended by the following acts Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000
More informationBallot secrecy with malicious bulletin boards
Ballot secrecy with malicious bulletin boards David Bernhard 1 and Ben Smyth 2 1 University of Bristol, England 2 Mathematical and Algorithmic Sciences Lab, France Research Center, Huawei Technologies
More informationMecklenburg County Department of Internal Audit. Mecklenburg County Board of Elections Elections Process Report 1476
Mecklenburg County Department of Internal Audit Mecklenburg County Board of Elections Elections Process Report 1476 April 9, 2015 Internal Audit s Mission Internal Audit Contacts Through open communication,
More informationPrêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia
662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,
More informationPOLICY 3.01 ELECTION, REFERENDUM, AND PLEBISCITE MANAGEMENT. Election Conduct
POLICY 3.01 ELECTION, REFERENDUM, AND PLEBISCITE MANAGEMENT Election Conduct POLICY INTENT To ensure a fair election of members to AUSU Council, this policy, written in accordance with Article 9 of the
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationElections, Technology, and the Pursuit of Integrity: the Connecticut Landscape
Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape Theodore Bromley 1 Peggy Reeves 2 Alexander Shvartsman 3 Abstract Transition from lever voting machines to electronic voting
More informationThe Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card
The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while
More informationVOTERGA SAFE COMMISSION RECOMMENDATIONS
VOTERGA SAFE COMMISSION RECOMMENDATIONS Recommended Objectives, Proposed Requirements, Legislative Suggestions with Legislative Appendices This document provides minimal objectives, requirements and legislative
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationMachine-Assisted Election Auditing
Machine-Assisted Election Auditing Joseph A. Calandrino *, J. Alex Halderman *, and Edward W. Felten *, * Center for Information Technology Policy and Dept. of Computer Science, Princeton University Woodrow
More informationScytl Secure Electronic Voting
Scytl Secure Electronic Voting eid Centric Approach for Building eservices and Electoral Process Modernization Lenka Kmetova CEE Business Development Manager lenka.kmetova@scytl.com Christoph Leixner Consultant
More informationElectronic Voting in Belgium Past, Today and Future
Electronic Voting in Belgium Past, Today and Future Danny De Cock K.U.Leuven ESAT/COSIC Slides available from http://godot.be/slides Electronic Voting in Belgium: Past, Today and Future 1 Outline Classic
More information