Modelling Context for the Design of Remote Electronic Voting Schemes
ثبت نشده
چکیده
There exists in the academic literature, a plethora of electronic voting schemes(for example (Cranor & Cytron 1997, Juang & Lei 1997, Benaloh & Tuinstra. 1994)). Typically, proposed schemes are accompanied by a description of the properties that an implemented electronic voting scheme would be expected to exhibit. These properties are described informally as for example, “ballot secrecy” or “universally verifiable”. To evaluate the proposed scheme, these informal notions are commonly incorporated in a mathematical model before a proof is outlined demonstrating that the proposed scheme does indeed exhibit the necessary properties. A disadvantage of this approach is that the required properties for a electronic voting schemes are implied to be static, with each new scheme to be evaluated against that standard. However, the context in which a voting system is employed varies considerably. Voting systems are employed in a variety of applications, with varying properties required as a result. Even voting systems that are employed in similar contexts, such as different electoral systems, exhibit varying properties according to the priorities of an entity organising a vote. This paper outlines the perceived failing of the current approach to designing and implementing electronic voting schemes, with regard to the considerable variation in the properties required. In addition, an approach is outlined that models the required properties of voting systems with the intention of providing a basis for evaluating electronic voting schemes in a particular context.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملPractical Remote Electronic Elections for the UK
The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing REV schemes employ some form of cryptography, either to secure transmission of votes, or to model some desirable feature of public elections. This paper outlines the limitations of employing cryptographic REV schemes and proposes ...
متن کاملRobust Coercion-Resistant Registration for Remote E-voting
During the registration phase of remote electronic voting schemes, the voter obtains a credential that proves the validity of her vote later, in the tallying phase. Most of the existing remote coercionresistant schemes either omit the description of the the registration phase or assume the existence of a trusted registering authority that authenticates voters as well as creates and distributes ...
متن کاملApplications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for verifiable delegation of computation are aimed to the efficient evaluation of polynomials, working on schemes where the polynomial and/or the input are kept secret to the server. Our proposal for rem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004