DocumentCode :
3409182
Title :
End-to-End cryptographic voting: Potentials and limitations
Author :
Awad, Maher ; Leiss, Ernst L.
Author_Institution :
Comput. Sci. & Eng. Dept., American Univ. of Ras Al Khaimah, Ras Al Khaimah, United Arab Emirates
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
113
Lastpage :
118
Abstract :
Due to the concerns associated with Direct Recording Electronics (DREs) and the limitations of the proposed verification method, such as Voter Verified Audit Trails (VVATs), an alternative scheme known as End-to-End (E2E) cryptographic voting was proposed. E2E cryptographic systems aim to resolve the conflict between secrecy and accuracy, two fundamental requirements of the electoral process. Additionally, the use of cryptography introduces several other advantages over conventional voting methods. On the other hand, cryptographic voting systems have various limitations that stand in the way of their adoption. In this paper we will discuss and analyze common E2E cryptographic voting systems, then we will suggest improvements on the cryptographic schemes, which address their limitations.
Keywords :
cryptography; government data processing; DRE; E2E cryptographic voting systems; VVAT; cryptographic schemes; direct recording electronics; electoral process; end-to-end cryptographic voting; voter verified audit trails; Accuracy; Contracts; Encryption; Internet; Mixers; Nominations and elections; Cryptography; Electronic Voting; End-to-End scheme;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750173
Filename :
6750173
Link To Document :
بازگشت