Anomaly Detection in Electronic Voting Systems

2013 ◽  
Vol 20 (3) ◽  
pp. 194-206
Author(s):  
Juan Gilbert ◽  
Jerone Dunbar ◽  
Alvitta Ottley ◽  
John Mark Smotherman

Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


2018 ◽  
Vol 60 (2) ◽  
pp. 41-60 ◽  
Author(s):  
Rodrigo Schneider ◽  
Kelly N. Senters

AbstractScholars concur that free and fair elections are essential for proper democratic functioning, but our understanding of the political effects of democratic voting systems is incomplete. This article mitigates the gap by exploiting the gradual transformation of voting systems and ballot structures in Brazil’s 1998 executive elections to study the relationship between voting systems and viable and nonviable candidates’ vote shares, using regression discontinuity design. It finds that the introduction of electronic voting concentrated vote shares among viable candidates and thus exhibited electoral bias. We posit that this result occurred because viable candidates were better able to communicate the information that electronic voters needed to cast valid ballots than were their nonviable counterparts. The article uses survey data to demonstrate that electronic voters responded to changes in ballot design and internalized the information viable candidates made available to them.


Author(s):  
Ali Fawzi Najm Al-Shammari ◽  
Adolfo Villafiorita

A large amount of research has been conducted to improve public verifiability of e-voting systems. One of the challenges is ensuring that different and apparently contradicting requirements are met: anonymity and representation, vote secrecy and verifiability. System robustness from attacks adds further complexity. This chapter summarizes some of the known vote verification techniques and highlights the pros and cons of each technique. Also, it reviews how different verification technologies cover different phases of the voting process and evaluates how these techniques satisfy the e-voting requirements.


Cyber Crime ◽  
2013 ◽  
pp. 918-935
Author(s):  
Xunhua Wang ◽  
Ralph Grove ◽  
M. Hossain Heydari

In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-net-based computer voting provides voter privacy and prevents vote selling/buying and vote coercion. Unlike traditional voting systems, mix-net-based computer voting has several additional advantages: 1) it offers vote verifiability, allowing individual voters to directly verify whether their votes have been counted and counted correctly; 2) it allows voters to check the behavior of potentially malicious computer voting machines and thus does not require voters to blindly trust computer voting machines. In this chapter, we give the full details of the building blocks for the mix-net-based computer voting scheme, including semantically secure encryption, threshold decryption, mix-net, and robust mix-net. Future research directions on secure electronic voting are also discussed.


2011 ◽  
pp. 1234-1239 ◽  
Author(s):  
Paulo Roberto Santhias ◽  
Regis Cabral

Electronic voting, as well as Internet voting, is in the process of being incorporated into most democracies in the world. The literature on the topic is abundant as well as the technologies offered. Most of the work, nevertheless, seems to bypass the actual origins of the modern (and current) electronic voting systems (Oudenhove et al., 2001).


2017 ◽  
Vol 13 (1) ◽  
pp. 82-99
Author(s):  
Danae V. Holmes ◽  
Philip Kortum

Verifying a ballot for correctness in an election is a critical task for the voter. Previous work has shown that up to 30% of the ballot can be changed without being noticed by more than half of the voters. In response to this ballot weakness, this study evaluated the usability and viability of alternative ballot verification methods in an electronic voting medium. Three verification methods were tested: end-of-ballot, in-line confirmation, and dual confirmation. In-line and dual confirmation perform similarly to end-of-ballot confirmation in terms of effectiveness. The most efficient method is end-of-ballot review, and dual confirmation produced the longest time spent on the review screen. End-of-ballot confirmation produced the highest satisfaction ratings, though survey results indicated that dual confirmation may be the most appropriate method in terms of voting. Additional research in the field is the next step in exploring these confirmation methods.


2013 ◽  
Vol 4 (5) ◽  
pp. 16-26 ◽  
Author(s):  
Saman Shojae Chaeikar ◽  
Mazdak Zamani ◽  
Christian Sunday Chukwuekezie ◽  
Mojtaba Alizadeh

2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


Sign in / Sign up

Export Citation Format

Share Document