Undervote and Pattern Voting: Vulnerability and a mitigation technique

نویسندگان

  • Stefan Popoveniuc
  • Jonathan Stanton
چکیده

Highly secure and auditable voting systems have been developed recently that open up the possibility of not only voting systems that claim to be secure, but ones that can actually be verified as secure and audited to the satisfaction of third party observers. Yet, these systems are still in development and do not yet handle all of the cases that arise in real-world elections. This extended abstract presents one specific vulnerability or limitation that arose in several of these voting system: Undervote and pattern vote tracking; This issue arose not so much because of flaws in the systems themselves, but rather, they are cases in which the strong protections provided by these systems did not take into account behaviours such as not voting on every contest. We present these issues in the context of PunchScan, a state of the art voting system. We present a technique for solving the issue using contest partitioning and analyze their impact on performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification and Mitigation of a Vulnerability in the ThreeBallot Voting Scheme

Recently, the ThreeBallot voting scheme has been proposed as a means of providing a voter with a non-transferable receipt for their vote without resorting to more traditional means of cryptography. The ThreeBallot scheme is attractive because voters are not required to either understand complex cryptography present in other voting schemes, or more usually, trust a software or hardware artifact ...

متن کامل

Underground transportation system risk assessment to mitigate vulnerability against natural disasters through intelligent urban management

Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...

متن کامل

Voting and different ranking orders in DEA

Data Envelopment Analysis (DEA) technique now widely use for efficiency evaluation of a set of Decision Making Units (DMUs). As regards of the necessity for ranking efficient units different DEA models presented each of which has advantages and rank efficient units from special aspects. Note that all the existing ranking models have disadvantages, as well and there is not a model in which all t...

متن کامل

Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter

The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...

متن کامل

An Optimization Model for Financial Resource Allocation Towards Seismic Risk Reduction

This paper presents a study on determining the degree of effectiveness of earthquake risk mitigation measures and how to prioritize such efforts in developing countries. In this paper a model is proposed for optimizing funds allocation towards risk reduction measures (building retrofitting) and reconstruction process after potential earthquakes in a regional level. The proposed model seeks opti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007