Undervote and Pattern Voting: Vulnerability and a mitigation technique
نویسندگان
چکیده
Highly secure and auditable voting systems have been developed recently that open up the possibility of not only voting systems that claim to be secure, but ones that can actually be verified as secure and audited to the satisfaction of third party observers. Yet, these systems are still in development and do not yet handle all of the cases that arise in real-world elections. This extended abstract presents one specific vulnerability or limitation that arose in several of these voting system: Undervote and pattern vote tracking; This issue arose not so much because of flaws in the systems themselves, but rather, they are cases in which the strong protections provided by these systems did not take into account behaviours such as not voting on every contest. We present these issues in the context of PunchScan, a state of the art voting system. We present a technique for solving the issue using contest partitioning and analyze their impact on performance.
منابع مشابه
Identification and Mitigation of a Vulnerability in the ThreeBallot Voting Scheme
Recently, the ThreeBallot voting scheme has been proposed as a means of providing a voter with a non-transferable receipt for their vote without resorting to more traditional means of cryptography. The ThreeBallot scheme is attractive because voters are not required to either understand complex cryptography present in other voting schemes, or more usually, trust a software or hardware artifact ...
متن کاملUnderground transportation system risk assessment to mitigate vulnerability against natural disasters through intelligent urban management
Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...
متن کاملVoting and different ranking orders in DEA
Data Envelopment Analysis (DEA) technique now widely use for efficiency evaluation of a set of Decision Making Units (DMUs). As regards of the necessity for ranking efficient units different DEA models presented each of which has advantages and rank efficient units from special aspects. Note that all the existing ranking models have disadvantages, as well and there is not a model in which all t...
متن کاملInterference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
متن کاملAn Optimization Model for Financial Resource Allocation Towards Seismic Risk Reduction
This paper presents a study on determining the degree of effectiveness of earthquake risk mitigation measures and how to prioritize such efforts in developing countries. In this paper a model is proposed for optimizing funds allocation towards risk reduction measures (building retrofitting) and reconstruction process after potential earthquakes in a regional level. The proposed model seeks opti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007