On the notion of ‘software independence’ in voting systems

Author(s):  
Ronald L Rivest

This paper defines and explores the notion of ‘software independence’ in voting systems: ‘A voting system is software independent if an (undetected) change or error in its software cannot cause an undetectable change or error in an election outcome’. For example, optical scan and some cryptographically based voting systems are software independent. Variations and implications of this definition are explored. It is proposed that software-independent voting systems should be preferred, and software-dependent voting systems should be avoided. An initial version of this paper was prepared for use by the Technical Guidelines Development Committee in their development of the Voluntary Voting System Guidelines, which will specify the requirements that the USA voting systems must meet to receive certification.

Author(s):  
I. V. Linev

Securitization of leasing assets was widely adopted abroad within the last decades. Securitization of leasing assets usually is meant as process of formation of a portfolio based on future leasing payments of one and (or) more leasing company and sale of securities to investors for the subsequent refinancing of leasing operations. These securities can be bonds, actions or bills. Thus the asset leased, acts as providing these papers. Nomenclature of property includes office, medical (first of all, stomatology), training, video the equipment, and also a car, motor-equipment, towers of cellular communication production of heavy mechanical engineering and computers. The essence of securitization of leasing assets consists in isolation of streams of leasing payments from risk of bankruptcy of the leasing company. As the considered mechanism has the greatest development in the USA, so far as consideration of experience of its application in this country is represented especially actual. The special attention is deserved by a question of decrease in credit risk of the investor. External and internal providing is applied to its decision in different types. Interest of participants in securitization of leasing assets consists in distribution of risks between them, emergence of a new source of financing, depreciation of attracted resources, increase of liquidity of a leasing portfolio and optimization by management by balance of the enterprise. Appeal of this tool to the leasing company in a case when it has no available own funds for business development, represents separate interest. Securitization allows the leasing company to expand sources of attraction of the capital and to receive a reserve for the future, and also to broaden the sphere of options of activity and to give it new opportunities for financing of projects. Widespread introduction of schemes of securitization in practice of the Russian leasing business, requires development, and on some aspects -creation of the corresponding legislative base. In the conditions of a tendency observed around the world to broad use of this tool, which gives a powerful impulse to development both bank, and real to sectors, Russia cannot stand aside from this process.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


2018 ◽  
Vol 10 (4) ◽  
pp. 50-64 ◽  
Author(s):  
Nicolas K. Blanchard

This article explores how to build popular trust for voting systems that rely heavily on statistical tools, as they are generally counter-intuitive to the average citizen (and even to experts). By trying out the voting system in public and letting people tinker with it, a first level of familiarity can be achieved. Preliminary results from real-world experiments seem encouraging and point out the importance of psychological and sociological factors in election organization as well as the influence of user interface design. To go further, integration into a larger debating platform held by a national party could give first-hand experience to the majority of the people, and would progressively build trust as the political stakes grow higher. Finally, the authors look into how different e-democratic tools could interact in a mutually beneficial manner.


Informatics ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 16
Author(s):  
Olawande Daramola ◽  
Darren Thebus

E-voting is one of the valid use cases of blockchain technology with many blockchain e-voting systems already proposed. But efforts that focus on critical analysis of blockchain e-voting architectures for national elections from stakeholders’ perspectives are mostly lacking in the literature. Therefore, government decision-makers and election stakeholders do not yet have a sufficient basis to understand the potential risks, challenges, and prospects that are associated with blockchain e-voting. This paper demonstrates how the use of the Architecture Trade-off Analysis Method (ATAM) can enable stakeholders in national elections to understand the risks, prospects, and challenges that could be associated with a blockchain e-voting system for national elections. By using a study context of South Africa, a proposed blockchain e-voting architecture was used as a basis to aid election stakeholders to reason on the concept of blockchain e-voting to get them to understand the potential risks, security threats, critical requirements attributes, and weaknesses that could be associated with using blockchain e-voting for national elections. The study found that blockchain e-voting can prevent many security attacks, internal vote manipulation, and promote transparency. However, voter validation and the security of the blockchain architecture are potential weaknesses that will need significant attention.


2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


2020 ◽  
Vol 32 ◽  
pp. 03001
Author(s):  
Anita A. Lahane ◽  
Junaid Patel ◽  
Talif Pathan ◽  
Prathmesh Potdar

Election could be a important event during a trendy democracy however massive sections of society round the world don’t trust their election system that is major concern for the democracy. Even the world’s largest democracies like Republic of India, us, and Japan still suffer from a blemished legal system. Vote rigging, hacking of the EVM (Electronic vote machine), election manipulation, and booth capturing square measure the key problems within the current electoral system. during this system, we tend to square measure work the problems|the problems within the election vote systems and attempting to propose the E-voting model which might resolve these issues. The system can highlight a number of the popular blockchain frameworks that provide blockchain as a service and associated electronic E-voting system that is predicated on blockchain that addresses all limitations severally, it additionally preserve participant’s obscurity whereas still being hospitable public examination. Building Associate in Nursing electronic electoral system that satisfies the legal necessities of legislators has been a challenge for an extended time. Distributed ledger technologies is Associate in Nursing exciting technological advancement within the info technology world. Blockchain technologies supply Associate in Nursing infinite vary of applications cashing in on sharing economies. Blockchain could be a unquiet technology of current era and guarantees to enhance the resilience of e-voting systems. this technique presents a shot to leverage edges of blockchain like cryptological foundations and transparency to attain an efficient theme for e-voting. The projected theme conforms to the elemental necessities for e-voting schemes and achieves end-to-end verifiability. The system presents in-depth analysis of the theme that with success demonstrates its effectiveness to attain Associate in Nursing end-to-end verifiable e-voting theme.


2013 ◽  
Vol 5 (1) ◽  
pp. 15-21 ◽  
Author(s):  
M. Mesbahuddin Sarker ◽  
M Nazrul Islam

Abstract In this modern age countries worldwide evince a growing interest in electronic voting (e-Voting), which brings the idea of modernizing elections through electronic systems and provides many advantages such as efficiency, disseminating results more quickly, and in a cost-effective way. The paper gives a brief overview on recent developments of electronic voting systems in Bangladesh by using electronic voting machine (EVM) and addresses some strategies and principles in order to improve accessibility, easiness, accuracy, and security of election for better democratic process.


2014 ◽  
Vol 56 (6) ◽  
Author(s):  
Ralf Küsters ◽  
Tomasz Truderung

AbstractSystems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior resulting in the loss of votes and incorrect election outcomes easily go undetected. In fact, numerous problems with e-voting systems have been reported in various countries. Therefore, in recent years modern e-voting systems have been designed that, among others, allow voters to check that their votes were counted correctly, even if voting machines and servers have programming errors or are outright malicious.In this paper, after a brief discussion of the problems of today's e-voting systems, we explain fundamental security properties modern e-voting systems should provide, including the above mentioned so-called verifiability property, and present a simple e-voting system to illustrate some of these properties. One important goal of our work is to provide security guarantees of such systems not only for abstract mathematical/cryptographic models of the systems but for the implementation of the systems directly. This requires us to combine various techniques and tools from security/cryptography, program analysis, and verification.


2012 ◽  
Vol 30 (5_suppl) ◽  
pp. 145-145
Author(s):  
Ignacio Gil-Bazo ◽  
Ainhoa Castillo ◽  
Maria E. Zudaire ◽  
Estefania Arevalo ◽  
Omar Esteban Carranza ◽  
...  

145 Background: ACRPC causes >30,000 deaths/year in the USA. The front-line treatment consists of docetaxel-based chemotherapy (D). 50% of patients (pts) show at least a 50% PSA decline during D and >15% show a partial response (R) in measurable disease. However, most of these pts present progression (P) after a median of 6-8 months (m). mCRPC remains driven by ligand-dependent androgen (A) receptor signaling. Ketoconazole (K) is a nonspecific cytochrome-P 17 inhibitor (CYP17i) able to block adrenal A synthesis. Low-dose K (LDK), (200 mg, t.d.s) has shown interesting activity in mCRPC after P to androgen deprivation therapy (ADT). The FDA recently granted approval to Abiraterone acetate, a selective CYP17i showing a survival benefit after P to D. The role of a CYP17i in the maintenance setting after response/stabilization to D has never been studied. Methods: 38 mCRPC pts starting D after P to ADT maintained LHRHa and additionally received a median of 7 cycles (3-12) of front-line three-weekly D (75 mg/m2) plus daily prednisone (10 mg). 20/38 pts showing no progression to D were enrolled. One month after the last D cycle 10 pts were assigned to MT with LDK plus prednisone (10 mg daily) and continued to receive LHRHa while the 10 pts in the control arm continued on LHRHa alone. Progression-free survival (PFS) was the primary endpoint of the study. Results: After a median follow-up of 27 m, all pts in the control arm progressed after D treatment while 8/10 pts progressed to MT. PFS from D initiation was 11.4 m for MT and 8.9 m for control arm (p=0.025). Toxicity profiles showed no significant differences between both arms. No pts discontinued LDK for toxicity reasons. Conclusions: To our knowledge, this is the first study testing a CYP17i for MT after response/stabilization to D in mCRPC. Although this is a small cohort of pts and a longer follow-up is needed, these preliminary data show a significant benefit in PFS of more than 2 months with LDK MT compared to no MT after D with a favorable toxicity profile. Thus, a further analysis in a larger series and the potential impact of this PFS benefit on the overall survival is warranted.


2016 ◽  
Vol 116 (4) ◽  
pp. 342-355 ◽  
Author(s):  
Keith Richards

Purpose – The purpose of this paper is to better understand what influences the intentions of college students to receive the human papillomavirus (HPV) vaccine. HPV is the most common sexually transmitted infection in the USA and cancers related to HPV are on the rise. Design/methodology/approach – A 2×2 experimental design was used to predict the intentions. Messages were created that manipulated the level of severity and vulnerability to determine which would increase intentions to receive the HPV vaccine. Each of the 278 participants viewed a message that contained one severity message (high or low) and one vulnerability message (high or low). Findings – Regression was used to determine that elements of the protection motivation theory such as vulnerability and fear, along with norms, and information seeking explained a significant portion of the variance in intent to be vaccinated (R2=0.40, F(4, 268)=44.47, p < 0.001). Norms had the most influence on intention (β=0.42, p < 0.001), next was vulnerability (β=0.21, p < 0.001) then fear (β=0.16, p=0.002), and finally information seeking (β=0.10, p=0.01). Originality/value – The current college age population did not have the opportunity to be vaccinated early and the recent (2011) recommendation that males get vaccinated makes this research valuable to those designing vaccination messages. The current study shows that norms were the most influential variable in regards to increasing intent to get vaccinated. This means that if the participant believed their friends would support or endorse their intent to get vaccinated they were more likely to say they would follow through and get vaccinated. This finding should be highlighted in any future campaign.


Sign in / Sign up

Export Citation Format

Share Document