[PDF][PDF] A review of contemporary e-voting: Requirements, technology, systems and usability
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …
away from serious application. The major challenges are to provide a secure solution and to …
On the notion of 'software independence'in voting systems
RL Rivest - … Transactions of the Royal Society A …, 2008 - royalsocietypublishing.org
This paper defines and explores the notion of 'software independence'in voting systems:'A
voting system is software independent if an (undetected) change or error in its software …
voting system is software independent if an (undetected) change or error in its software …
Secure digital voting system based on blockchain technology
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental
benefits over paper-based systems such as increased efficiency and reduced errors …
benefits over paper-based systems such as increased efficiency and reduced errors …
Coercion-resistant electronic elections
We introduce a model for electronic election schemes that involves a more powerful
adversary than previous work. In particular, we allow the adversary to demand of coerced …
adversary than previous work. In particular, we allow the adversary to demand of coerced …
Verifying privacy-type properties of electronic voting protocols
Electronic voting promises the possibility of a convenient, efficient and secure facility for
recording and tallying votes in an election. Recently highlighted inadequacies of …
recording and tallying votes in an election. Recently highlighted inadequacies of …
Accountability: definition and relationship to verifiability
R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …
auction, identity-based encryption, and certain forms of secure multi-party computation …
[PDF][PDF] Electing a university president using open-audit voting: Analysis of real-world use of Helios
Abstract In March 2009, the Université catholique de Louvain elected its President using a
custom deployment of the Helios web-based open-audit voting system. Out of 25,000 …
custom deployment of the Helios web-based open-audit voting system. Out of 25,000 …
[PDF][PDF] Simple verifiable elections.
J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines
developed over the past two decades by a pair of government-owned companies. These …
developed over the past two decades by a pair of government-owned companies. These …
Scantegrity: End-to-end voter-verifiable optical-scan voting
Scantegrity is a security enhancement for optical scan voting systems. It's part of an
emerging class of" end-to-end" independent election verification systems that permit each …
emerging class of" end-to-end" independent election verification systems that permit each …