Electronic Voting Using Identity Domain Separation and Hardware Security Modules

2010 ◽  
Vol 2 (1) ◽  
pp. 30-44
Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.

Author(s):  
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. This paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.


2014 ◽  
Vol 56 (6) ◽  
Author(s):  
Ralf Küsters ◽  
Tomasz Truderung

AbstractSystems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior resulting in the loss of votes and incorrect election outcomes easily go undetected. In fact, numerous problems with e-voting systems have been reported in various countries. Therefore, in recent years modern e-voting systems have been designed that, among others, allow voters to check that their votes were counted correctly, even if voting machines and servers have programming errors or are outright malicious.In this paper, after a brief discussion of the problems of today's e-voting systems, we explain fundamental security properties modern e-voting systems should provide, including the above mentioned so-called verifiability property, and present a simple e-voting system to illustrate some of these properties. One important goal of our work is to provide security guarantees of such systems not only for abstract mathematical/cryptographic models of the systems but for the implementation of the systems directly. This requires us to combine various techniques and tools from security/cryptography, program analysis, and verification.


2021 ◽  
Vol 4 (2(112)) ◽  
pp. 47-57
Author(s):  
Yuriy Khlaponin ◽  
Volodymyr Vyshniakov ◽  
Viktoriia Ternavska ◽  
Oleksandr Selyukov ◽  
Oleg Komarnytskyi

It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


Author(s):  
Jeffrey Hsu ◽  
Qiyang Chen ◽  
Gary Bronson

Voting has been an accepted means for electing candidates, receiving public approval for referendums and budgets, and for many other tasks where the will of the people, whether a broad population or a select group, can be recorded and measured in a tangible way. Because of advances in technology, together with problems inherent in manual forms of voting, the concepts and issues relating to electronic voting (e-voting) and various other technology-based forms, are been proposed, discussed, and examined. The goal of all such systems is the casting and recording of the votes from eligible voters as they intended to be cast, with adequate security. This security requires that there be no identifiable connection between the voter and the vote that is cast, while providing an audit trail that can be used to validate that every vote was counted and tallied, as cast. The focus of this paper is to examine electronic voting technologies from the perspective of usability in controlled environments. Current research has shown that such systems form the majority of the nascent e-voting technologies, primarily because they have come closest to solving the usability and security issues inherent in technology–based voting systems.


2013 ◽  
Vol 5 (1) ◽  
pp. 15-21 ◽  
Author(s):  
M. Mesbahuddin Sarker ◽  
M Nazrul Islam

Abstract In this modern age countries worldwide evince a growing interest in electronic voting (e-Voting), which brings the idea of modernizing elections through electronic systems and provides many advantages such as efficiency, disseminating results more quickly, and in a cost-effective way. The paper gives a brief overview on recent developments of electronic voting systems in Bangladesh by using electronic voting machine (EVM) and addresses some strategies and principles in order to improve accessibility, easiness, accuracy, and security of election for better democratic process.


Voting is the principal incident in any democratic country. Generally voting is done using ballots system, but this technique is ancient and can be easily sabotaged. There is a necessity to bring in new technologies to ensure effective implementation of digital voting systems. The security of digital voting is a significant aspect for implementation and must meet the requirements to be appropriate for trust worthiness. Block chain technology provides reliable electronic voting system that can be secured by adding more decision so that the possible attacks can be avoided. Block chain technology based on crypto currency implements diffused database architecture with transaction records secured by transactions.


Author(s):  
B U Umar ◽  
O M Olaniyi ◽  
L A Ajao ◽  
D Maliki ◽  
I C Okeke

            Democratic government in the world today rely on electronic voting as the foremost means of providing credible, transparent and fair elections for the electorate. There is a need for developed electronic voting systems to be security enhanced to ensure the authenticity of the developed system. Traditional paper balloting systems suffer from vote tampering, multiple voting and illegal voting by unregistered voters. They are also, susceptible to under aged voting due to the difficulty in authenticating the identity of prospective voters. Manual collation and publication of vote results also leads to slow response times and inaccuracies in published results. This research paper proposes a system to combat the current challenges through the development of a fingerprint biometric authentication system for secure electronic voting machines. It uses a fingerprint biometric sensor, integrated via Python to verify users of the system. The inclusion of biometrics improves the security features of the system. The secure voting system is built using PHP and easy to use Graphical User Interface was designed using HTML and CSS. Users are required to interact with the machine via a 7” touchscreen interface. From the results, it shows that the developed machine has a minimum response time of 0.6 seconds for specific operation, an FAR of 2%, FRR of 10% and overall system accuracy of 94%. The developed machine is able to combat the challenges of authentication of users, thereby guaranteeing the transparency, credibility, integrity and vote authenticity of the elections.


2021 ◽  
Vol 7 (2) ◽  
pp. 102-109
Author(s):  
W. Salman

The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.


Author(s):  
Sumit Kumar

The latest technology is turning into a vital element in financial business. This paper presents a proposed system called Wi-Fi Security Card (WCS) based on the very common and growing problem of electronic transaction fraud in the countries of India. To solve such problems, we have proposed a novel secure payment method known as Wi-Fi Security Card (WCS). In this paper, we also compared the WCS system to another existing system called Dropped Card Detection (DCD) and Microcontroller and Sensors (MAS). The main advancement of our system over the existing system is that WCS can also prevent fraudulent transactions. Nowadays, security issues in e-payments are usually more demanding than current security issues on the internet. Our findings may enable e-transaction providers to extend their secure payment systems by increasing their protection as necessary for appropriate financial services.


Sign in / Sign up

Export Citation Format

Share Document