End-to-End Cryptography: Spreading Democracy
نویسندگان
چکیده
Due to concerns related to the security and privacy of conventional and electronic voting systems as well as the shortcomings of some verification methods, such as Voter Verified Paper Audit Trails (VVPATs), an alternative approach known as End-to-End (E2E) voter verifiable system was proposed. E2E systems rely on cryptography to provide voters and the public with both secrecy and accuracy, two fundamental requirements of the electoral process that conventional voting systems (including paper ballots) failed to assure. While the use of cryptography introduces several advantages over conventional voting methods, cryptographic voting systems have various limitations of their own. In this paper, we will briefly analyze two of the proposed E2E voting systems. We then address some of the existing limitations that may stand in the way of their implementation.
منابع مشابه
Political Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa
Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...
متن کاملMeasuring democracy and ‘good governance’ in Africa: A critique of assumptions and methods
Since the end of the Cold War the world has witnessed significant political and economic developments with far-reaching consequences for global order. For instance, the democratisation processes and outcomes in some countries in Eastern Europe, Latin America and Africa have benefited from the triumph of globalisation. Also, the new neoliberal global order under the influence of the United State...
متن کاملThe Barriers of Democracy Development in Persian Gulf’s Arabic Countries in Globalization Era
One of the common features of Persian Gulf countries is the same historical destiny, which comes from colonization, religion, tradition and the common culture, which have influenced the political structures of these countries. To this end, in the recent decades, lack of democracy in this region is highly considered by the thinkers. With development of international communications, some of these...
متن کاملRadboud University Liquid Requirements Engineering
In this case study, an e-democracy approach called liquid democracy is applied for gathering feedback from a large group of software end-users. Liquid democracy aims to leverage the scalability of decision processes to a crowd of people. The outcomes gave an indication of the added value of liquid democracy techniques for gathering end-user requirements. Traditional requirements engineering app...
متن کاملPractical Attacks on Cryptographically End-to-end Verifiable Internet Voting Systems
Cryptographic end-to-end verifiable voting technologies concern themselves with the provision of a more trustworthy, transparent, and robust elections. To provide voting systems with more transparency and accountability throughout the process while preserving privacy which allows voters to express their true intent. Helios Voting is one of these systems—an online platform where anyone can easil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016