On Electronic Voting Schemes
نویسنده
چکیده
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAn Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions
In most of the anonymous electronic voting schemes presented in the literature, every voter must decide his intention for a voting before the tally center performs the signing operation on his vote. In these schemes, voters cannot modify or update their intentions embedded in the signed votes even if they have not been sent to the tally center for tallying yet. This paper presents a new anonymo...
متن کاملA framework and taxonomy for comparison of electronic voting schemes
Electronic voting is an emerging social application of cryptographic protocols. A vast amount of literature on electronic voting has been developed over the last two decades. In this paper, we provide a framework that classifies these approaches and defines a set of metrics under which their properties can be compared. Such a methodology reveals important differences in security properties betw...
متن کاملThe Risk of e-Voting
World wide, there are various proposals for automating manual voting processes. This paper considers two different e-voting schemes, Internet voting and direct recording electronic (DRE) voting systems, explicitly focusing on risk to the integrity of the voting process. Fair elections must assure voter authentication, vote confidentiality and integrity, and the ability to audit the election. E-...
متن کاملModelling Context for the Design of Remote Electronic Voting Schemes
There exists in the academic literature, a plethora of electronic voting schemes(for example (Cranor & Cytron 1997, Juang & Lei 1997, Benaloh & Tuinstra. 1994)). Typically, proposed schemes are accompanied by a description of the properties that an implemented electronic voting scheme would be expected to exhibit. These properties are described informally as for example, “ballot secrecy” or “un...
متن کاملPractical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, there exist solutions based on the mix concept, which allow for anonymous e-mail communications. However, integration of such solutions into the implementation of a voting scheme has some problems. In this paper we propo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006