Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017
…
12 pages
1 file
The wide availability of mobile devices, such as smartphones, enabled mobility in our lifestyles. However, traditional voting systems require physical presence of the voter at a specific place and time, which is incompatible with the concept of mobility. The goal of this paper is to propose an Internet voting system, called TrustedVote, that allows voters to cast their vote anywhere. Moreover, Internet voting significantly raises the turnout rate, reduces administrative costs and tallying time. In order to tackle malware and other insecurities in the client mobile platform, the solution is based on smartphones with a Trusted Execution Environment (TEE). TrustedVote leverages the isolation properties of TEEs available in Android and iOS smartphones to perform the cryptographic steps of an Internet voting system, such as vote encryption and voter authentication.
The foundation of a strong democracy is an informed and engaged citizenry. And what better way to both inform and engage citizens than through the power of today's information and communication technologies? Citizens around the world recognize and embrace the benefits of e-Government services such as online tax filing, license renewal, and benefits claims. Now governments are initiating strategies that support e-democracyand in doing so, engaging more citizens in democratic processes. This brief addresses the highly formal processes of e-democracy-in particular e-voting to offer governments and democratic-based entities worldwide the infrastructures, applications, and services necessary to implement and manage reliable, secure e-voting systems. In this paper, an electronic voting scheme using GSM based Mobile technology is presented. By integrating an electronic voting scheme with the Mobile infrastructure, we are able to exploit existing Secure Mobile authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy.
International Conference on Digital Information Management (ICDIM), 2013
Electronic voting system provides convenience and access to the electorate without the geographical restrictions. Mobile phone is one of the emerging technologies to perform e-voting with democratic norms and privacy concern. In this paper we suggest a mobile phone voting protocol based on hybrid cryptosystem. Protocol consists of three phases: online registration; vote casting and vote collecting and result phase. Proposed protocol provides secure and efficient online vote casting and can also be implemented parallel with paper ballot voting system. Proposed protocol hasefficiency, security and deployable in developing countries due to its reliance on SMS messaging without requiring internet connectivity.
This thesis focuses on the development of an enhanced innovative secure mobile Internet voting system architecture that offers desirable security requirements to theoretically mitigate some of the intrinsic administrative and logistical challenges of voting, inter alia lack of mobility support for voters, voter inconvenience, election misconduct, and possible voter coercion often associated with the conventional poll-site voting system. Systems in existence have tended to revolve around the need to provide ubiquitous voting, but lack adequate control mechanism to address, in particular, the important security requirement of controlling possible coercion in ubiquitous voting. The research work reported in this thesis improves upon a well-developed Sensus reference architecture. It does so by leveraging the auto-coupling capability of near field communication, as well as the intrinsic merits of global positioning system, voice biometric authentication, and computational intelligence t...
Revista Facultad de Ingeniería Universidad de Antioquia
Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been the main tools to implement electronic voting systems (e-voting). Some years ago, mobile devices had not been considered due to their storage restrictions and low computational power; however, nowadays the technology in these devices has advanced and it is possible to implement complicated applications that offer security services such as confidentiality and authentication. In this paper, a reliable and efficient e-voting system for Android Smartphone is implemented. The e-voting proposed herein is composed of three entities: the authentication server (AS), the voting server (VS) and the voter (V) which runs on an Android Smartphone. Two short messages, between V and AS, are necessary to generate an electronic ballot. In order to cast...
IACR Cryptol. ePrint Arch., 2016
We propose a new Direct-Recording Electronic (DRE)-based voting system that we call TRVote. The reliability of TRVote is ensured during the vote generation phase where the random challenges are generated by the voters instead of utilizing the random number generator of the machine. Namely, the challenges of voters are utilized to prevent and detect a malicious behavior of a corrupted voting machine. Due to the unpredictability of the challenges, the voting machine cannot cheat voters without being detected. TRVote provides two kinds of verification; “cast-as-intended” is ensured during the vote generation phase and “recorded-as-cast” is ensured through a secure Web Bulletin Board (WBB). More concretely, voters can verify that their votes are cast as intended via a zero-knowledge proof on a printed receipt using QR codes. After the election, the central server broadcasts all receipts in a secure WBB where the voters (or, perhaps proxies) can check whether their receipts appear correc...
Abstract:-Mobile voting is a kind of Electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so we need to define a different and new security protocol that can observe max requirement of voting. We offer a new protocol with different structure from whatever said now. In this protocol, we use from blind signature in cell phone and Mix networks in Intelligence.
The term "Electronic Voting (E-Voting)" refers to the use of Mobile Equipment to cast votes in Election. E-Voting aims as increasing participation lowering the cost of running elections and improving the accuracy of the results. This project describes the requirements, design and implementation of a special type of electronic voting system, suitable for co-operate sectors where people can cast their votes anytime, anywhere thus enhancing the commercial prospects for appointed service. Each individual voter will be authenticated through Security Questions. To avoid the web content replication for each of the connecting device the implemented system separates the data contents from its presentation form. The separation is achieved by using modern technologies such as example the hypertext preprocessor represent the web data content and the hypertext preprocessor language transformation style sheets to customize the presentation of such content on different connecting devices.
We present a new remote, coercion-resistant electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce trusted computing as a method of ensuring the trustworthiness of remote voters, and provide an extension to our protocol allowing revocable anonymity, on the grounds of it being a legal requirement in the United Kingdom.
Computers & Security, 2005
In this paper we propose SEAS, the Secure E-voting Applet System, a portable, mobile, flexible, light system for polling over computer networks. The protocol is based on Sensus, . Though maintaining its lightness (basically there are two only servers involved in the whole voting process), SEAS avoids the well-known weakness that allows one of the entities involved in the election process to cast its own votes replacing other votes. We propose an implementation of SEAS based on Java applets and XML technology.
2010
We present a hardware trusted computing base (TCB) aimed at Direct Recording Voting Machines (T-DRE), with novel design features concerning vote privacy, device verifiability, signed-code execution and device resilience. Our proposal is largely compliant with the VVSG (Voluntary Voting System Guidelines), while also strengthening some of its reccomendations. To the best of our knowledge, T-DRE is the first architecture to employ multi-level, certification-based, hardware-enforced privileges to the running software. T-DRE also makes a solid case for the feasibility of strong security systems: it is the basis of 165,000 voting machines, set to be used in a large upcoming national election. In short, our contribution is a viable computational trusted base for both modern and classical voting protocols. * Partially funded by KRYPTUS and SERASA Experian research grants † Partially funded by FAPESP (2007/56052-8), CNPq (309491/2008-8), and SERASA Experian research grants ‡ Partially funded by FAPESP (
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Proc. of Workshop on …, 2006
CSI Transactions on ICT, 2013
Proceedings of the Thirtieth Hawaii International Conference on System Sciences
BT Technology Journal, 2000
Advances in Information Security, 2003
Lecture Notes in Computer Science, 2013
International Journal of Electronic Government Research, 2000
Journal of Information Security and Applications