Electronic Voting 2006

نویسنده

  • Robert Krimmer
چکیده

At Estonian local elections in October 2005 for the first time in the world binding country-wide remote Internet voting took place: whole Estonian electorate had a possibility to cast the vote via Internet. Approximately 2 % of actual voters made use of this possibility. The e-voting surveys show that the attitude of the Estonian public toward e-voting was and is positive; gender, income, education, type of settlement and even age are no important factors by choosing e-voting from all voting channels; the use of e-voting possibility depends mostly on the trust in the procedure of e-voting and E-voting in itself does not produce any political effects. Estonian e-voting experience in 2005 reassures the hypothesis that e-voting does not raise the voting activity of people who never take part in elections, but it can encourage the participation of voters who vote sometimes. Thus, e-voting could slow down the trend of falling participation. Despite successful e-voting experience in October 2005, the political debate around e-voting has started in Riigikogu (Estonian Parliament) again. If the evoting provisions will not be excluded from the law, the next country-wide evoting in Estonia is taking place February-March 2007 by next Riigikogu elections.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

The Feasibility Analysis of Electronic Voting

This paper focuses on the feasibility of electronic voting. At first, a brief introduction of what electronic voting is; how it works and what its requirements are given. Then the popular implementation models in today’s electronic voting solutions are discussed. All the models are not perfect yet; experts are debating for the direction of electronic voting. Analyses of this paper go deep into ...

متن کامل

Uncoercible Anonymous Electronic Voting

Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditional paper-based voting activities in some developed countries. A secure anonymous e-voting system has to satisfy many properties, such as completeness, tally correctness, and uncoercibility, where the uncoercibility property is the most difficult one to be achieved. Since each voter can obtain a...

متن کامل

Contributions to Traditional Electronic Voting Systems in order to Reinforce Citizen Confidence

This document provides a general description of the telematic voting scenario designed by the author’s research group. This scenario reinforces verification procedures as key elements to achieve full acceptance of the system on the part of voters. To frame this work, a general overview of electronic voting is given and the conditions entailed by these systems are specified. 1 Problems inherent ...

متن کامل

An Electronic Voting System Supporting VoteWeights

Typically each voter contributes with one vote for an election. But there are some elections where voters can have different weights associated with their vote. In this paper we provide a solution for allowing an arbitrary number of weights and weight values to be used in an electronic voting system. We chose REVS, Robust Electronic Voting System, a voting system designed to support Internet vo...

متن کامل

A framework and taxonomy for comparison of electronic voting schemes

Electronic voting is an emerging social application of cryptographic protocols. A vast amount of literature on electronic voting has been developed over the last two decades. In this paper, we provide a framework that classifies these approaches and defines a set of metrics under which their properties can be compared. Such a methodology reveals important differences in security properties betw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006