Presenting An Improved Electronic Voting Protocol

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,341

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ECDC07_061

تاریخ نمایه سازی: 9 تیر 1392

Abstract:

Traditional voting methods are not only time consuming and expensive, but also are vulnerable to human errors. An electronic voting system should be designed in a way to fulfilla set of security features such as democracy, integrity, privacy and verification. It is critically necessary to build these features because breaking even one of them could result in irreparable consequences for society. Different protocols for electronic voting systems are provided inorder to meet these specifications. Recently, optical scan voting systems are provided with End-to-End verification. In these systems, voters can investigate whether their votes areregistered properly by means of receipts provided for them in case of voting. Moreover, anyobserver can verify that votes’ counting were done correctly. All these tasks can be done without risk of manifesting voter’s privacy and ballot. In this paper, an optical scan voting protocol called EBMScan is provided in which voting cards would be given to voters after authenticating process by n servers in which voters should put it, i.e. voting card, in voting machine in order to select their candidate(s). Once selected, receipts are printed on the samevoting card for every voter. Then voters put their ballots in scanner - in order to be scanned -with help of a voting authority. First, scanner checks whether receipt is valid and then it scansposition of marked locations. Voters can take receipt back into their possession after a stampwas recorded on receipt. These protocols are designed in a way to be resistant to attacks associated with manipulation, identification, disruption, discreditation, chain voting and randomization.

Authors

Malihe Samiei

MalekAshtar University of Technology, Tehran, Iran

Ali Payandeh

University of Technology, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Receipts: True _ ter-Verifiable Elections". IEEE Security and Secret-Balloه [1] ...
  • S. Popoveniuc and B. Hosp. _ introduction to Punchscan? Proceedings ...
  • K. Fisher, R. Carback and A.T. Sherman. :Punchscan: introduction and ...
  • A. Essex, J. Clark, R. Carback, and S. Popoveniuc. ":Punchscan ...
  • Kevin Fisher ":Punchscan: Security analysis of a high integrity voting ...
  • D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, ...
  • D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, ...
  • D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, ...
  • R. Carback, D. Chaum, J. Clark, J. Conway, A. Essex, ...
  • Ballot Privacy". In 19th USENI Security Symposium (Washington, DC, USA, ...
  • A. T. Sherman, R. A. Fink, R. Carback and D. ...
  • نمایش کامل مراجع