شماره ركورد كنفرانس :
3340
عنوان مقاله :
Presenting An Improved Electronic Voting Protocol
پديدآورندگان :
Samiei Malihe Department of Information and Communication Technology, MalekAshtar University of Technology, Tehran, Iran , Payandeh Ali Department of Information and Communication Technology, MalekAshtar University of Technology, Tehran, Iran
كليدواژه :
Electronic Voting , Voter , Vote Card , Ballot , Confirmation Code , EBMScan
عنوان كنفرانس :
هفتمين كنفرانس بين المللي تجارت الكترونيكي در كشورهاي در حال توسعه با تمركز بر امنيت ملي
چكيده لاتين :
Traditional voting methods are not only time consuming and expensive, but also are
vulnerable to human errors. An electronic voting system should be designed in a way to fulfill
a set of security features such as democracy, integrity, privacy and verification. It is critically
necessary to build these features because breaking even one of them could result in irreparable
consequences for society. Different protocols for electronic voting systems are provided in
order to meet these specifications. Recently, optical scan voting systems are provided with
End-to-End verification. In these systems, voters can investigate whether their votes are
registered properly by means of receipts provided for them in case of voting. Moreover, any
observer can verify that votes’ counting were done correctly. All these tasks can be done
without risk of manifesting voter’s privacy and ballot. In this paper, an optical scan voting
protocol called EBMScan is provided in which voting cards would be given to voters after
authenticating process by n servers in which voters should put it, i.e. voting card, in voting
machine in order to select their candidate(s). Once selected, receipts are printed on the same
voting card for every voter. Then voters put their ballots in scanner - in order to be scanned -
with help of a voting authority. First, scanner checks whether receipt is valid and then it scans
position of marked locations. Voters can take receipt back into their possession after a stamp
was recorded on receipt. These protocols are designed in a way to be resistant to attacks
associated with manipulation, identification, disruption, discreditation, chain voting and
randomization.