Title :
Survey of the current voter verification algorithms
Author :
Javid Moayed, Majid ; Ghani, Abdul Azim Abdul ; Mahmod, Ramlan
Author_Institution :
Dept. of Comput. Sci. & Inf. Technol., Univ. Putra Malaysia, Serdang
Abstract :
Security in voting system especially in voter verification for satisfaction voter about her votes in cast and counted as intended is one of the most important topics in voting systems. There are ballot of cryptographic election protocols which they encrypt content ballot separate from the voter intended, therefore they canpsilat do ensure that the voting booth records the correct vote. Nowadays, there is a little method that they combined voter intended and ballot encryption together. Every one of these methods has private property and some advantages and disadvantages. For developing in this array, knowing all same methods and comparing them is very helpful. In this article was tried to introduce current same method in voter verification and then compare them.
Keywords :
cryptographic protocols; formal verification; public administration; content ballot encryption; cryptographic election protocols; voter verification algorithms; voting system security; Communication system security; Computer science; Computer security; Information security; Information technology; Nominations and elections; Printing; Public key cryptography; Software performance; Voting;
Conference_Titel :
Computer and Communication Engineering, 2008. ICCCE 2008. International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-1691-2
Electronic_ISBN :
978-1-4244-1692-9
DOI :
10.1109/ICCCE.2008.4580639