• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Privacy and verifiability in voting systems: Methods, developments and trends,” Cryptology ePrint Archive, Report 2013/615 (2013)

by H Jonker, S Mauw, J Pang
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Efficient End to End Verifiable Electronic Voting Employing Split Value Representations

by Michael O. Rabin, Ronald L. Rivest
"... Abstract—We present a simple and fast method for conducting end to end voting and allowing public verification of correctness of the announced vote tallying results. In the present note voter privacy protection is achieved by use of a simple form of distributing the tallying of votes and creation of ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—We present a simple and fast method for conducting end to end voting and allowing public verification of correctness of the announced vote tallying results. In the present note voter privacy protection is achieved by use of a simple form of distributing the tallying of votes and creation of a verifiable proof of correctness amongst several servers, combined with random representations of integers as sums mod M of two values. At the end of vote tallying process, random permutations of the cast votes are publicly posted in the clear, without identification of voters or ballot ids. Thus vote counting and assurance of correct form of cast votes are directly available. Also, a proof of the claim that the revealed votes are a permutation of the concealed cast votes is publicly posted and verifiable by any interested party. We present two versions of the method, one assuring voter privacy and proof of correctness in the presence of information leaking

The Implementation of a Split-Value Verifiable Voting System

by Marco Antonio L. Pedroso, Marco Antonio L. Pedroso , 2015
"... This study provides a proof-of-concept of a newly designed verifiable voting system. The implementation elicits details in the communication and synchronization among servers, unavailable in the original design paper [M. O. Rabin and R. L. Rivest, "Efficient End to End Verifiable Electronic Vot ..."
Abstract - Add to MetaCart
This study provides a proof-of-concept of a newly designed verifiable voting system. The implementation elicits details in the communication and synchronization among servers, unavailable in the original design paper [M. O. Rabin and R. L. Rivest, "Efficient End to End Verifiable Electronic Voting Employing Split Value Representations. " in Proc. EVOTE ’14, Bregenz, Austria.]. The implemented system was tested on networks of virtual machines in a cluster, and its performance was evaluated based on the computational time and amount of data transferred. The preliminary results simulates elections with up to ten thousand votes. The team will conduct further work to implement the handling of server failures and the secure channels among the servers. This study demonstrates the feasibility of running large elections with more transparent voting systems, by leveraging the split-value representation and simple cryptographic primitives.
(Show Context)

Citation Context

...ryland, United Statessin 2009 [6], the Wombat system was used in 2012 in Israel [7]. There is also a new design by the STARVote team to be used in Travis County, Texas [17].sThe work by Jonker et al. =-=[19]-=- synthesizes the common building blocks used in the constructionsof E2E voting systems. According to the authors, to achieve privacy the most common designs use a subsetsof the following tools: homomo...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University