شماره ركورد كنفرانس :
3340
عنوان مقاله :
Presenting An Improved Electronic Voting Protocol
پديدآورندگان :
Samiei Malihe Department of Information and Communication Technology, MalekAshtar University of Technology, Tehran, Iran , Payandeh Ali Department of Information and Communication Technology, MalekAshtar University of Technology, Tehran, Iran
كليدواژه :
Electronic Voting , Voter , Vote Card , Ballot , Confirmation Code , EBMScan
سال انتشار :
2013
عنوان كنفرانس :
هفتمين كنفرانس بين المللي تجارت الكترونيكي در كشورهاي در حال توسعه با تمركز بر امنيت ملي
چكيده لاتين :
Traditional voting methods are not only time consuming and expensive, but also are vulnerable to human errors. An electronic voting system should be designed in a way to fulfill a set of security features such as democracy, integrity, privacy and verification. It is critically necessary to build these features because breaking even one of them could result in irreparable consequences for society. Different protocols for electronic voting systems are provided in order to meet these specifications. Recently, optical scan voting systems are provided with End-to-End verification. In these systems, voters can investigate whether their votes are registered properly by means of receipts provided for them in case of voting. Moreover, any observer can verify that votes’ counting were done correctly. All these tasks can be done without risk of manifesting voter’s privacy and ballot. In this paper, an optical scan voting protocol called EBMScan is provided in which voting cards would be given to voters after authenticating process by n servers in which voters should put it, i.e. voting card, in voting machine in order to select their candidate(s). Once selected, receipts are printed on the same voting card for every voter. Then voters put their ballots in scanner - in order to be scanned - with help of a voting authority. First, scanner checks whether receipt is valid and then it scans position of marked locations. Voters can take receipt back into their possession after a stamp was recorded on receipt. These protocols are designed in a way to be resistant to attacks associated with manipulation, identification, disruption, discreditation, chain voting and randomization.
كشور :
ايران
تعداد صفحه 2 :
14
از صفحه :
1
تا صفحه :
14
لينک به اين مدرک :
بازگشت