Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2003
A secure PKI based system for e-voting was developed. We tested the application, several organizational aspects, and usability in fourteen field trials. In this paper we describe the method and findings. What do we learn about turnout, about the logistics of organizing evoting, and about usability and reliability of the system in practice?
2009
International Journal for Research in Applied Science & Engineering Technology, 2021
Building a secure electronic voting system that offers the fairness and privacy of current voting schemes. "Vote", the word means to determine or to elect or select from a list or who will run the country or the organization or a group. To find leaders selected by people is the prime aim of voting. In this work-in-progress paper, we evaluate an application which providing security with OTP login.
Advances in Information Security, 2003
With the increasing popularity public key infrastructures have been acquiring in recent years and the legislative support for digital signatures, electronic voting protocols are moving from a strictly research area to the commercial arena. In this paper we examine the role public key infrastructures play in electronic voting in various protocols proposed in the literature, some of which are the kernel of experimental projects and/or commercial products. Although one of the rationals to move towards electronic voting systems is cost-effectiveness, in this paper we argue that performance issues should not be overlooked, especially in case of disaster recovery, were a CA to revoke all of its certificates during an election. Based on performance evaluation studies, we show that directory service access may become the system bottleneck.
The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), 2007
The level of research that e-voting has attracted is a testimony of its importance as a key element in the implementation of e-government. It is argued that the ease with which voting can be performed will increase participation and enhance accountability. This convenience however, generates a set of specific requirements, not least the ability of the underlying distributed system to model the behaviour of manual systems. More specifically, the elimination of direct physical intervention entails a careful management of the implications of virtual participation. The scope of this work concerns the identification and integration of specific mechanisms for addressing issues of security, privacy and accountability. The aim of this paper is to present a case study on the design and implementation of an e-voting prototype system, and to provide a context for the selection and deployment of relevant mechanisms.
E-Government Strategies and Advancements, 2011
International Journal of Electronic Government Research
One of the major fields that have applied ICT in the 21st century government is e-voting. Around the world, e-voting is taking place and is seen as highly important in many countries. However, in many countries, including the Kingdom of Bahrain, public trust toward voting using ICT tools is still a big challenge. This research aims to investigate the factors that affect public trust toward using e-voting system in Bahrain. A model of trust and risk was used from previous studies and several hypotheses were tested. A questionnaire was employed and 453 responses from citizens were collected in Bahrain. The findings revealed that there are significant factors that the governments should focus on to enhance public trust in the context of e-voting, which are: trust in e-voting; trust of government; perceived risk; disposition to trust and intention to use. The research strength of this study resides in its insights on the factors to be considered by the government to overcome the mistrus...
2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE), 2014
We present the initial set of findings from a pilot experiment that used an Internet-based end-toend verifiable e-voting system and was held during the European Elections 2014 in Athens, Greece. During the experiment, which took place on May 25th 2014, 747 people voted with our system in special voting stations that were placed outside two main polling places in Athens, Greece. The election mimicked the actual election that was taking place which included a great number of parties. After casting their ballot, voters were invited to complete online a post-election questionnaire that probed their attitudes towards e-voting. In total, 648 questionnaires were collected. We present a description of the experiment and a regression analysis of our results. Our results suggest that acceptance of the e-voting system was particularly high especially among the most educated, the technologically adept but also-somewhat surprisingly-older generations.
ww.w.naun.org
Authentication and privacy are central issues for acceptance of any e-Voting system in particular and growth of e-Services in general. This paper aims to: (i) to analyze the appropriate architecture and propose new efficient architecture of electronic voting system in Kosovo, and (ii) to analyze the threat vectors and their avoidance in such system. The novelty of implemented solution is based on using dynamic queue list generated based on voters arrivals and identification at the polling station. The proposed architecture enables citizens to cast their vote in any polling station, in opposite to paper form voting where citizen is linked to his predefined polling station. The national election commission configures the smart card, as part of electronic voting infrastructure, to allow decryption of number of records that matches the number of voters in final country wide voting list. The communication between polling stations and central server is encrypted with server's public key stored in digital certificate and every casted vote is digitally signed by ballot box private key. The developed model is used to compare the costs and efficiency of e-Voting against the traditional paper based voting system in Kosovo.
2013
In this paper we present a framework for conducting electronic elections over the web taking into consideration the legal consequences. The proposed system has to be based on open source software with its own security protocol. It will be an alternative and practical solution to existing e-voting systems applications not only for communities, universities and organizations but for national and communities elections as well. Key-Words: E-voting, Electronic Election Systems, Requirements, Types, Legal Aspects, Technical Aspects
2016
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.
This paper hopefully contributes to the discussion on what kind of electronic voting systems utilizing Internet technology we should be aiming at and what characteristics these systems should have. It provides an overview of the major constitutional and legal aspects of e-voting, together with their technical implications. It also discusses the security requirements and the system-wide properties that the voting protocol of an electronic voting system is expected to fulfill. An overview of families of existing voting protocols, together with a brief analysis of their characteristics, is provided. The aim is to investigate and discuss the extent to which current voting protocols comply with the identified requirements.
2005
It is generally considered that a key component of electronic government in the future will be electronic voting, as a means of facilitating the participation of citizens in elections and public debates. However, a long path has to be pursued before electronic voting, particularly if based on Internet, is accepted as a reliable system alternative to conventional methods. In this paper, we propose a new and simple platform, based on open software, which can be used primarily in small to medium sized communities, as a means to build confidence and experience for future larger elections. We try to provide adequate answers to multiple requirements, such as accuracy, democracy, privacy, verifiability and mobility. This can be done by establishing a distributed system which supports the different roles of a voting system and by using cryptography techniques in the interactions between these components.
There are many challenges facing the applied E-voting in voting in ballots of elections .
International Journal of Information Systems and Social Change, 2015
Voting has been an accepted means for electing candidates, receiving public approval for referendums and budgets, and for many other tasks where the will of the people, whether a broad population or a select group, can be recorded and measured in a tangible way. Because of advances in technology, together with problems inherent in manual forms of voting, the concepts and issues relating to electronic voting (e-voting) and various other technology-based forms, are been proposed, discussed, and examined. The goal of all such systems is the casting and recording of the votes from eligible voters as they intended to be cast, with adequate security. This security requires that there be no identifiable connection between the voter and the vote that is cast, while providing an audit trail that can be used to validate that every vote was counted and tallied, as cast. The focus of this paper is to examine electronic voting technologies from the perspective of usability in controlled environm...
Advances in Information Security, 2003
This paper presents the security requirements and the system wide properties that the voting protocol of an electronic voting system is expected to fulfil. Then, an overview of the existing voting protocols, together with a brief analysis of their characteristics, is provided. The aim is to investigate and discuss the extent to which current voting protocols comply with the identified requirements and thus examine the feasibility of organising and conducting an internet based election in a secure, efficient and reliable way.
Publicationes Universitatis Miskolcinensis Sectio Juridicata et Politica, 2019
We all live in a rushing, always moving and changing network society where saving time became one of the most important things. Different kinds of e-services both from the private and public sectors are meant to facilitating our lives, make dealing with issues easier, faster, and cheaper than the traditional ways. In addition, the whole society became more mobile in the last few decades than it used to be, and as a result, the need for remote-(public)-administration is essential. As a parallel process, e-democracy and e-government evolved to serve the changing needs and to make proceedings more time-and cost-effective. One of the recent extensions of e-democracy is electronic voting which provides great opportunities, but threats, too. This paper aims to collect the general issues of e-voting, its features, and sub-types, the pros, and cons of its application.
Indonesian Journal of Electrical Engineering and Computer Science
Advances in Information and Communications Technology (ICT) have impacted the society in many ways. Be it education, healthcare, media or governance, the transformation is visible. As individual entities like education or healthcare systems have already implemented ICT to certain extent, e-governance is yet to make a significant progress even though several initiatives are undertaken. E-governance means activities like voting, administration, financial transaction etc., are enabled using automation systems. This paper discusses one part of the e-governance; e-voting. As evoting empowers government, there are lot of challenges in implementing the e-voting system considering security threats and confidentiality involved in it. Online voting (e-voting) needs to be deployed as more convenient, relatively secure and less resource consuming system. E-voting system should ensure convenience for people to be able to access the system from personal or public computer with security and confidentiality. The presence of e-voting system with all the necessary security measures and convenience can be a potential solution for low voter turnout at the polls. The presented work demonstrates an online e-voting prototype system called SecureV. The proposed model achieves specific tasks namely, maintaining the anonymity of the voter, encryption of the vote, integrity check and avoids second time voting.
Computers & Security, 2002
Journal of Information Security and Applications
A cryptographic electronic voting system is proposed, to replace the conventional voting methods, which are widely used in most developing countries in the Middle East and North Africa (MENA) region. The proposed e-voting system is based on the concept of Prêt à Voter, which is a paper ballot e-voting scheme. Mixnet based e-voting schemes such as Prêt à Voter use mix servers to create anonymous channels. These schemes have some shortcomings; Mixnets need complex protocols for generating and maintaining shared mix keys, as well as for mixing and proving correctness of the shuffles. Moreover, Mixnets are complex to implement on a large scale. Mixnets are also vulnerable to corrupt or faulty mix servers as well. The proposed e-voting scheme eliminates the need for anonymous channels to anonymize the votes in Mixnet based e-voting schemes, yet provides comparable level of security and vote anonymity with less system complexity. The proposed e-voting scheme uses paper ballots, due to its familiarity among the public, but with strong cryptographic algorithms with proven security features, to provide enhanced level of ballot secrecy, verifiability and security. The proposed scheme is simple, secure, practical, and auditable. Security evaluation is conducted based on the critical and desirable properties of e-voting to support the claimed aspects. Threat analysis of the proposed e-voting system had been conducted to prove its resistance to well-known attacks on e-voting schemes and systems. A proof of concept implementation and simulation of the proposed e-voting scheme was developed to elucidate its efficiency, practicality, and scalability. The research proposal has the potential to be deployed as a trustworthy evoting system, to replace the conventional voting methods in developing countries.
Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 Bregenz, Austria, October 6–9, 2020, Proceedings, 2020, 2020
E-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes, a system that has been utilized to cast over 2 million votes over the last 6 years. The ultimate goal of the analysis is not to judge from a rigid, "infallible" but to contribute to a gradual and secure implementation of e-voting solutions in the democratic processes. The authors believe it can constitute a useful source of information for election officials, researchers and voters.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.