• DocumentCode
    3409182
  • Title

    End-to-End cryptographic voting: Potentials and limitations

  • Author

    Awad, Maher ; Leiss, Ernst L.

  • Author_Institution
    Comput. Sci. & Eng. Dept., American Univ. of Ras Al Khaimah, Ras Al Khaimah, United Arab Emirates
  • fYear
    2013
  • fDate
    9-12 Dec. 2013
  • Firstpage
    113
  • Lastpage
    118
  • Abstract
    Due to the concerns associated with Direct Recording Electronics (DREs) and the limitations of the proposed verification method, such as Voter Verified Audit Trails (VVATs), an alternative scheme known as End-to-End (E2E) cryptographic voting was proposed. E2E cryptographic systems aim to resolve the conflict between secrecy and accuracy, two fundamental requirements of the electoral process. Additionally, the use of cryptography introduces several other advantages over conventional voting methods. On the other hand, cryptographic voting systems have various limitations that stand in the way of their adoption. In this paper we will discuss and analyze common E2E cryptographic voting systems, then we will suggest improvements on the cryptographic schemes, which address their limitations.
  • Keywords
    cryptography; government data processing; DRE; E2E cryptographic voting systems; VVAT; cryptographic schemes; direct recording electronics; electoral process; end-to-end cryptographic voting; voter verified audit trails; Accuracy; Contracts; Encryption; Internet; Mixers; Nominations and elections; Cryptography; Electronic Voting; End-to-End scheme;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
  • Conference_Location
    London
  • Type

    conf

  • DOI
    10.1109/ICITST.2013.6750173
  • Filename
    6750173