Towards Trustworthy Elections: New Directions in Electronic Voting

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.

Author(s): Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida (eds.)
Series: Lecture Notes in Computer Science 6000 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 403
Tags: Data Encryption; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Computers and Society; Information Systems Applications (incl.Internet)

Front Matter....Pages -
The Witness-Voting System....Pages 1-36
Coercion-Resistant Electronic Elections....Pages 37-63
Receipt-Free K -out-of- L Voting Based on ElGamal Encryption....Pages 64-82
A Secure Architecture for Voting Electronically (SAVE)....Pages 83-96
A Modular Voting Architecture (“Frog Voting”)....Pages 97-106
Unconditionally Secure Electronic Voting....Pages 107-123
Electronic Elections: A Balancing Act....Pages 124-140
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization....Pages 141-154
The Vector-Ballot Approach for Online Voting Procedures....Pages 155-174
On Optical Mark-Sense Scanning....Pages 175-190
On Some Incompatible Properties of Voting Schemes....Pages 191-199
A Threat Analysis of Prêt à Voter....Pages 200-215
Anonymity in Voting Revisited....Pages 216-230
Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting....Pages 231-241
An Introduction to PunchScan....Pages 242-259
Component Based Electronic Voting Systems....Pages 260-273
A Verifiable Voting Protocol Based on Farnel....Pages 274-288
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster....Pages 289-309
Improving Remote Voting Security with CodeVoting....Pages 310-329
A Practical and Secure Coercion-Resistant Scheme for Internet Voting....Pages 330-342
Scratch, Click & Vote: E2E Voting over the Internet....Pages 343-356
Securing Optical-Scan Voting....Pages 357-369
Attacking Paper-Based E2E Voting Systems....Pages 370-387
Aperio: High Integrity Elections for Developing Countries....Pages 388-401
Back Matter....Pages -