A Synthesis of Vote Verification Methods in Electronic Voting Systems

Author(s):  
Ali Fawzi Najm Al-Shammari ◽  
Adolfo Villafiorita

A large amount of research has been conducted to improve public verifiability of e-voting systems. One of the challenges is ensuring that different and apparently contradicting requirements are met: anonymity and representation, vote secrecy and verifiability. System robustness from attacks adds further complexity. This chapter summarizes some of the known vote verification techniques and highlights the pros and cons of each technique. Also, it reviews how different verification technologies cover different phases of the voting process and evaluates how these techniques satisfy the e-voting requirements.

2017 ◽  
Vol 13 (1) ◽  
pp. 82-99
Author(s):  
Danae V. Holmes ◽  
Philip Kortum

Verifying a ballot for correctness in an election is a critical task for the voter. Previous work has shown that up to 30% of the ballot can be changed without being noticed by more than half of the voters. In response to this ballot weakness, this study evaluated the usability and viability of alternative ballot verification methods in an electronic voting medium. Three verification methods were tested: end-of-ballot, in-line confirmation, and dual confirmation. In-line and dual confirmation perform similarly to end-of-ballot confirmation in terms of effectiveness. The most efficient method is end-of-ballot review, and dual confirmation produced the longest time spent on the review screen. End-of-ballot confirmation produced the highest satisfaction ratings, though survey results indicated that dual confirmation may be the most appropriate method in terms of voting. Additional research in the field is the next step in exploring these confirmation methods.


Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


2013 ◽  
Vol 20 (3) ◽  
pp. 194-206
Author(s):  
Juan Gilbert ◽  
Jerone Dunbar ◽  
Alvitta Ottley ◽  
John Mark Smotherman

Author(s):  
Daria Zubkova

The paper deals with some complex issues related to the implementation of the electoral right by citizens through the remote form. The specifics of electronic voting, its pros and cons are revealed.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


2018 ◽  
Vol 60 (2) ◽  
pp. 41-60 ◽  
Author(s):  
Rodrigo Schneider ◽  
Kelly N. Senters

AbstractScholars concur that free and fair elections are essential for proper democratic functioning, but our understanding of the political effects of democratic voting systems is incomplete. This article mitigates the gap by exploiting the gradual transformation of voting systems and ballot structures in Brazil’s 1998 executive elections to study the relationship between voting systems and viable and nonviable candidates’ vote shares, using regression discontinuity design. It finds that the introduction of electronic voting concentrated vote shares among viable candidates and thus exhibited electoral bias. We posit that this result occurred because viable candidates were better able to communicate the information that electronic voters needed to cast valid ballots than were their nonviable counterparts. The article uses survey data to demonstrate that electronic voters responded to changes in ballot design and internalized the information viable candidates made available to them.


Cyber Crime ◽  
2013 ◽  
pp. 918-935
Author(s):  
Xunhua Wang ◽  
Ralph Grove ◽  
M. Hossain Heydari

In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-net-based computer voting provides voter privacy and prevents vote selling/buying and vote coercion. Unlike traditional voting systems, mix-net-based computer voting has several additional advantages: 1) it offers vote verifiability, allowing individual voters to directly verify whether their votes have been counted and counted correctly; 2) it allows voters to check the behavior of potentially malicious computer voting machines and thus does not require voters to blindly trust computer voting machines. In this chapter, we give the full details of the building blocks for the mix-net-based computer voting scheme, including semantically secure encryption, threshold decryption, mix-net, and robust mix-net. Future research directions on secure electronic voting are also discussed.


2011 ◽  
pp. 1234-1239 ◽  
Author(s):  
Paulo Roberto Santhias ◽  
Regis Cabral

Electronic voting, as well as Internet voting, is in the process of being incorporated into most democracies in the world. The literature on the topic is abundant as well as the technologies offered. Most of the work, nevertheless, seems to bypass the actual origins of the modern (and current) electronic voting systems (Oudenhove et al., 2001).


Sign in / Sign up

Export Citation Format

Share Document