Internet Voting, Security, and Privacy
نویسنده
چکیده
Internet voting is an appealing concept to most voters, primarily for reasons of convenience (“why can’t I vote in my pajamas at a convenient time”), while appealing because of the attractiveness of technology. However, Internet voting is fundamentally different from other types of online transactions such as banking or shopping. In this Article, I describe different types of Internet voting, the advantages and disadvantages from a security and privacy perspective, and provide perspective on the history and evolution of the field. * SRI International. William & Mary Bill of Rights Journal Symposium: Privacy, Democracy, and Elections, October 22, 2010. This article was prepared with support from ACCURATE: A Center for Correct, Usable, Reliable, Auditable and Transparent Elections, under National Science Foundation Grant No. 0524111. 1 E-mail from Mitch Trachtenberg, Software Developer, to author (Oct. 11, 2010, 11:06 EST) (on file with author). 2 Alex Altman, Will Online Voting Turn Into an Election Day Debacle?, TIME, Oct. 15, 2010, available at http://www.time.com/time/politics/article/0,8599,2025696,00.html (quoting Ron Rivest, computer scientist and cryptography expert). 3 Dan Morrell, Secret Ballots, Verifiable Votes, HARV. MAG., May–June 2010, at 10 (quoting Ben Adida, inventor of Helios, an Internet voting system). 4 Editorial, Hacked!, WASH. POST, Oct. 19, 2010, at A14.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملSecurity Aspects of Electronic Voting Systems
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: on-line, e.g. via Internet, and offline, by using a voting machine or an electronic polling booth. Security is the main challenge of e-voting. This is the reason why designing a secure e-voting system is very im...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملElectronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building “voting protocols” that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013