E-Voting Security Protocol Analysis & Solution (original) (raw)
Related papers
Security of E-Voting System in Case of Malicious Users
2015
In a democratic country, voting is one of the most important activ-ity. In many democracies over the years, there has been decrease in the number of voters coming for election because of the incon-venient voting system. An electronic voting scheme allows voters to vote securely from distance through internet by interacting with a set of authorities. However there is always a chance that an ad-versary can corrupt the users and jeopardize the voting system. In this paper, we have proposed an E-voting protocol that ensures the three most important requirements of E-voting system i.e privacy, verifiability and fairness even in case when some of the users are malicious.
Security of E-Voting Term Project (Spring 2017 – 2018) MSIT 520 Security in Computing
One of the most significant current discussions in Computer Science is security in using electronic voting systems. These systems play a decisive role in democratic organizations and are a new technology which helps electors to cast their ballots in an election using computerized systems. However, different attacks and threats may be carried out depending on the operational environment in which the system is used. Voting systems can be easily exposed to attack from different serious threats of denial of service and a Man-in the-Middle attack.
Practical Security Analysis of E-voting Systems
We adapt game theoretic methods for studying the security of two e-voting systems: the Estonian E-Voting System (EstEVS) and Secure Electronic Registration and Voting Experiment (SERVE) performed in the United States of America. While these two systems are quite similar from technical side, security experts have made totally different decisions about their security—EstEVS was indeed used in practical elections while SERVE was decided to be insecure. The aim of this work is to clarify if the minor technical differences between these two systems were indeed a sufficient reason to distinguish between their security. Our analysis is oriented to practical security against large-scale attacks. We define a model for the real-life environment in which voting takes place and analyze the behavior of adversaries. We show that in our model EstEVS is secure and SERVE is not. The reliability of the results is still questionable because of our limited knowledge about many of the parameters. It turns out though that our main results are quite robust with respect to the choice of parameters.
A SECURE AND ROBUST PROTOTYPE FOR ELECTRONIC VOTING SYSTEM
iaeme
Electronic voting (EV) refers to the use of computers or computerized voting equipments to castballots in an election EV has been in development for more than 20 years, during which it has produced outstanding results both in theory and in practice. This paper presents a new secure preferential e-voting scheme. In this paper we will present an e-voting scheme that covers most of the e-voting requirements were implemented to guarantee voter’s privacy and authentication. A prototype implementation of EV protocol over the Internet which fulfils some electronic voting system requirements such as efficiency, transparency and mobility has been presented.
Secure Online E-voting Protocol Based on Voters Authentication
International Journal of Innovative Technology and Exploring Engineering
Although there are many e-voting systems present by analysis it is found that they all are vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to implement the public key encryption e-voting system. The primary objective of this system is to make ensure reliability, privacy and security of the protocol and voting is convenience to users. As a result of the specification requirements, the system was summarized into three parts: access control process which limit access to a system or to any other resource. Secondly, voting process was done by encrypting voter's electronic ballot before submitting to the server. Finally, the final result was sorted through deciphering the received encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is generated using the OTP princ...
Implementation and Analysis of Secure Electronic Voting System
International Journal of Scientific & Technology Research, 2013
In this technological and knowledge age, e-commerce related matters become popular. Electronic voting is one of these matters and it is able to provide convenient, less expensive, fast and secure facilities. Important basic properties of electronic voting are fairness, privacy, eligibility, receiptfreeness, coercion-resistance and verifiability. Current electronic voting systems satisfy only some of these properties. So, the proposed system aims to design and implement an electronic voting system which satisfies the required properties of electronic voting process. After implementing the system, it will be verified using mCRL2 language in order to prove the satisfaction of the security properties. The performance of the proposed system will be compared with the other existing e-voting systems.
Security analysis of remote e-voting
2007
In this paper, we analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting. We examine whether it is feasible to successfully carry out remote electronic voting over the existing Internet infrastructure that conforms to ...
E-Voting System Security Optimization
2021
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holistic approach, which considers all parts of such a complex system, has to be chosen. The security of an election system cannot be ensured unless every single element and its securityrelated characteristics, interfaces to other elements, and their impact on the whole system are examined. This paper presents the E-Voting System Security Optimization method, which is based on such an approach and was developed to evaluate the security of e-voting systems. This method points out security flaws, shows security optimization potential, and can be used to compare different election systems. The methodology differs from other approaches insofar as it uses a holistic approach, visualizes the security situation of an e-voting system in a clear way, and shows its potential for improvement.