Presenting An Improved Electronic Voting Protocol
محل انتشار: هفتمین کنفرانس بین المللی تجارت الکترونیک در کشورهای در حال توسعه با رویکرد بر امنیت ECDC2013
سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,417
فایل این مقاله در 14 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ECDC07_061
تاریخ نمایه سازی: 9 تیر 1392
چکیده مقاله:
Traditional voting methods are not only time consuming and expensive, but also are vulnerable to human errors. An electronic voting system should be designed in a way to fulfilla set of security features such as democracy, integrity, privacy and verification. It is critically necessary to build these features because breaking even one of them could result in irreparable consequences for society. Different protocols for electronic voting systems are provided inorder to meet these specifications. Recently, optical scan voting systems are provided with End-to-End verification. In these systems, voters can investigate whether their votes areregistered properly by means of receipts provided for them in case of voting. Moreover, anyobserver can verify that votes’ counting were done correctly. All these tasks can be done without risk of manifesting voter’s privacy and ballot. In this paper, an optical scan voting protocol called EBMScan is provided in which voting cards would be given to voters after authenticating process by n servers in which voters should put it, i.e. voting card, in voting machine in order to select their candidate(s). Once selected, receipts are printed on the samevoting card for every voter. Then voters put their ballots in scanner - in order to be scanned -with help of a voting authority. First, scanner checks whether receipt is valid and then it scansposition of marked locations. Voters can take receipt back into their possession after a stampwas recorded on receipt. These protocols are designed in a way to be resistant to attacks associated with manipulation, identification, disruption, discreditation, chain voting and randomization.
کلیدواژه ها:
نویسندگان
Malihe Samiei
MalekAshtar University of Technology, Tehran, Iran
Ali Payandeh
University of Technology, Tehran, Iran
مراجع و منابع این مقاله:
لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :