Dissertations / Theses on the topic 'Electronic voting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Electronic voting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ødegård, Rune Steinsmo. "Electronic voting systems." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9499.
Full textWe present the cryptographic primitives needed in the construction of electronic voting systems based on homomorphic encryptions and on verifiable secret sharing. Then "The theory and implementation of an electronic voting system" by Ivan Damgård, Jens Groth and Gorm Salomonsen is presented as an example of electronic voting systems based on homomorphic encryptions, while "Multi-authority secret-ballot election with linear work" by Ronald Cramer, Matthew Franklin, Berry Schoenmakers and Moti Yung is presented as an example of electronic voting systems based on verifiable secret sharing. Moreover, the mathematical background for these systems are studied with particular emphasis on the security issues of the relevant sub-protocols. Comparing these two examples we find that the presented voting system based on verifiable secret sharing is more secure then the one based on homomorphic encryptions, both in regard to privacy and robustness. On the other hand, we find that the presented voting system based on homomorphic encryptions is more efficient then the one based on verifiable secret sharing.
Storer, Timothy W. "Practical pollsterless remote electronic voting." Thesis, St Andrews, 2007. http://hdl.handle.net/10023/223.
Full textGuasch, Castelló Sandra. "Individual verifiability in electronic voting." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/387119.
Full textAquesta tesi és fruit de la feina de l'autora com a personal de recerca a la empresa Scytl Secure Electtronic Voting, així com de la col·laboració amb la Paz Morillo, del departament de matemàtica aplicada a la UPC, i el Alex Escala, estudiant de doctorat. A la feina a Scytl, l'autora ha participat a varis projectes de vot electrònic per a eleccions vinculants a nivell nacional, que s'han efectuat a varis països. La participació de la autora ha cobert tant la fase de disseny del protocol, com la fase de implementació, on ha proveït suport als equips de desenvolupament. La tesi estudia els mecanismes que es poden proporcionar als votants per a poder examinar i verificar els processos que s'executen en sistemes de vot electrònic. Tot i que la tesi no parla de la implementació dels sistemes de vot electrònic, sí que s'enfoca en protocols que han tingut, o poden tenir, una aplicació pràctica actualment. La tesi té els continguts següents: Un estudi en sistemes de vot electrònic que proporcionen funcionalitats per a que els votants verifiquin els processos. Entre aquests sistemes, trobem el que es va utilitzar a les eleccions municipals i parlamentàries a Noruega als anys 2011 i 2013, així com el sistema utilitzat a l'estat Australià de New South Wales, per a les eleccions generals de 2015, sistemes en els que l'autora ha participat directament en el diseny dels seus protocols criptogràfics. La tesi també conté una sintaxi que es pot utilizar per modelar sistemes de vot electrònic que proporcionen verificabilitat individual (on verifica el votant). Aquesta sintaxi s'enfoca en sistemes caracteritzats pel fet de que el votant confirma la emissió del seu vot un cop ha verificat unes evidències sobre ell, proporcionades pel protocol. A més de la sintaxi, es proporcionen definicions de les propietats de seguretat d'aquestts sistemes. La tesi també conté una descripció del sistema i protocol de vot electrònic que s'utilitza al cantó Suís de Neuchâtel a partir del 2014, el qual té funcionalitats per a que els votants verifiquin certs processos del sistema. La tesi a més conté un anàlisi de la seguretat de l'esquema, així com possibles extensions del protocol. Finalment, la tesi inclou dos protocols nous que proporcionen noves característiques i funcionalitats respecte als existents a l'estat de l'art de la tècnica. El primer permet a un votant defendre's de un coaccionador generant proves falses, i el segon fa un canvi de paradigma de la verificabilitat individual, de forma que el votant no ha de verificar certs processos per a saber que s'han efectuant correctament. La tesi inclou un anàlisi formal de les propietats de seguretat dels dos protocols, així com exemples de com podrien ser implementats en un escenari real.
Cornejo, Ramírez Mario Sergei. "An elastic electronic voting system." Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/136271.
Full textEn los últimos años, organizaciones y movimientos sociales han aparecido demandando más participación en políticas públicas. En éstas organizaciones, los miembros demandan ser parte del proceso de toma de decisiones el cual generalmente se realiza mediante iniciativas de voto directo entre los miembros. Además utilizan Internet intensamente como la plataforma principal de comunicación y tienden a confundir sistemas de encuestas con herramientas de votación electrónica. Por otra parte, no es claro que software se debe utilizar, y la debilidad de la mayoría de éstos que tienen con respecto a la robustez (capacidad de computar bien el resultado) más que con la privacidad del voto, además de la facilidad de uso. Como una forma de mejorar la participación, nosotros proponemos un sistema de votación electrónica para ese segmento, que incluye organizaciones sociales, federaciones de estudiantes, colegios, sindicatos, sociedades profesionales, etc. El problema de votación electrónica ha sido ampliamente estudiado por criptógrafos, y hoy en día, existen varios protocolos para resolver problemas específicos a votación electrónica. Nosotros proponemos una solución que toma en consideración esas soluciones existentes combinadas con protocolos de sistemas distribuidos para introducir un sistema de votación electrónica remota elástica. El sistema utiliza la tecnología elastic computing de Amazon que permite escalar en términos de capacidad de computación y alta disponibilidad junto al anonimato de los votantes y la garantía que el voto fue correctamente contado. Concretamente, el sistema está pensado sobre cinco principios: i) Computación elástica, ii) Internet iii) Facilidad de uso, iv) Anonimato y computación verificable, v) Cliente liviano. El objetivo de esta tesis no es solamente resolver el problema abierto descrito anteriormente, sino también establecer una base sólida para plataformas de votación electrónicas a través de Internet. De este modo, nosotros creamos un nuevo sistema de votación electrónica en donde el votante no realiza ninguna computación grande, sino que la trasladamos al servidor, que idealmente está en una plataforma de Cloud Computing como Amazon Web Services. Esta técnica previene ataques de denegación de servicio, robo de identidad y accesos no autorizados, al mismo tiempo preserva la privacidad y la verificabilidad. La plataforma se probó en un caso real, concretamente en una experiencia de votación electrónica en donde los chilenos demandando su derecho a voto en el extranjero, pudieron votar en una elección simbólica. Se presenta la experiencia, los problemas y las soluciones que encontramos utilizando un sistema de identificación simple. Esta proyecto nos permitió estudiar de forma técnica, política y práctica aplicaciones de votación electrónica en América Latina.
Mateu, Meseguer Víctor. "New approaches for electronic voting paradigms." Doctoral thesis, Universitat de Lleida, 2015. http://hdl.handle.net/10803/378641.
Full textLa democracia es el sistema de gobierno más usado en el mundo. No obstante, en un mundo cada vez más globalizado, la idea de movilizar a la gente para votar en un colegio electoral gestionado por personas resulta anticuada a pesar de ser la implementación más común en la actualidad. Mejorar esta situación mediante el uso de las tecnologías de la información parece una evolución obvia y muy solicitada pero, a pesar de unas pocas adaptaciones, aún no ha sido usada salvo en escasas ocasiones. Abrir la puerta de unas elecciones a las tecnologías de la información lleva implícita la apertura de los protocolos de voto a un nuevo conjunto de ataques contra estos. Teniendo en cuenta los requisitos de una elección: privacidad del votante e integridad de la elección, las soluciones actuales pasan por implementar la elección siguiendo uno de los tres paradigmas de voto seguros: mezcla de votos, recuento homomórfico o firma ciega. En esta tesis, se proponen nuevos protocolos para los distintos paradigmas. La primera propuesta consiste en un sistema de voto bajo el paradigma de mezcla de votos que, basándose en una información redundante enviada por el votante, es capaz de realizar una mezcla de votos con un coste negligible incrementando ligeramente el coste del recuento. Para el paradigma de recuento homomórfico, se propone una prueba para verificar que el voto es válido basada en las pruebas de correctitud en sistemas con mezcla de votos. Esta solución permite usar las mejoras realizadas en el paradigma de mezcla de votos para su uso en el paradigma de recuento homomórfico. Finalmente, se proponen dos nuevos protocolos del paradigma de firma ciega. El primero utiliza credenciales generadas con firma ciega para permitir a votantes válidos enviar su voto sin que se conozca su identidad. El segundo resuelve el problema del voto doble en el paradigma de firma ciega mediante una construcción que utiliza un sistema de moneda electrónica off-line.
Democracy is the most established government system in the world. However, in an increasingly globalized world, the idea of requiring people to move in order to cast their vote in the polling station seems outdated, even though it is, nowadays, the most common implementation. An obvious and widely demanded evolution is to improve the election framework by enabling the use of information technologies. Nevertheless, this solution has been implemented few times in real environment elections and the global success of these solutions have been called into question. The use of information technologies in voting protocols improves the quality of the election but, at the same time, it also opens up the voting protocols to new threats. Keeping this attacks in mind and given the election requirements: voter's privacy and election's integrity, the solutions proposed up to date are to implement one of the three secure voting paradigms: mixtype based, homomorphic tally, and blind signature. In this thesis, we present new protocols for the di erent paradigms. Our rst proposal, based on the mix-type paradigm, consists in a voting protocol which is able to perform the ballot mix with negligible cost but slightly increasing the tally cost. The proposed protocol makes use of a proper vote generation based on sending secret redundant information with the ballot when it is cast. For the homomorphic tally paradigm, we propose a zero knowledge proof of correctness of the ballot based on the proofs used to demonstrate the correctness of a shu e in the mix-type paradigm. This protocol makes possible to use the improvements on the shu e correctness proofs in the homomorphic tally paradigm. Finally, two di erent protocols are also proposed for the blind signature paradigm. The rst one uses credentials generated by means of a blind signature which allow eligible voters to cast their vote without leaking information about their identity. The second one is focused on solving the double voting problem in this paradigm. The protocol proposed uses o -line e-coin systems to provide anonymity disclosure in case of double voting.
Kersting, Norbert. "Electronic voting : globaler Trend oder Utopie?" Universität Potsdam, 2005. http://opus.kobv.de/ubp/texte_eingeschraenkt_welttrends/2010/4800/.
Full textXia, Zhe. "Secure electronic voting : design and analysis." Thesis, University of Surrey, 2009. http://epubs.surrey.ac.uk/843264/.
Full textDossogne, Jérôme. "Advances in secure remote electronic voting." Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/219608.
Full textDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Liburd, Soyini (Soyini Denise) 1980. "An N-version electronic voting system." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28441.
Full textIncludes bibliographical references (p. 103-109).
The ballot battles of the 2000 US Presidential Election clearly indicate that existing voting technologies and processes are not sufficient to guarantee that every eligible voter is granted their right to vote and implicitly to have that vote counted, as per the fifteenth, nineteenth, twenty fourth and twenty sixth amendments to the US constitution [1-3]. Developing a voting system that is secure, correct, reliable and trustworthy is a significant challenge to current technology [3, 4]. The Secure Architecture for Voting Electronically (SAVE) demonstrates that N-version programming increases the reliability and security of its systems, and can be used to increase the trustworthiness of systems. Further, SAVE demonstrates how a viable practical approach to voting can be created using N-version programming. SAVE represents a significant contribution to voting technology research because of its design, and also because it demonstrates the benefits of N-version programming and introduces these benefits to the field of voting technology.
by Soyini D. Liburd.
M.Eng.
Cohen, Sharon B. "Auditing technology for electronic voting machines." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33119.
Full textIncludes bibliographical references (leaf 63).
Direct Recording Electronic (DRE) voting machine security has been a significant topic of contention ever since Diebold voting machine code turned up on a public Internet site in 2003 and computer scientists at Johns Hopkins University declared the machine "unsuitable for use in a general election." Since then, many people from computer scientists to politicians have begun to insist that DREs be equipped with a paper trail. A paper trail provides a paper printout for the voter to approve at the end of each voting session. Although there have been strong political efforts to place paper trails on DRE machines, there have not been any scientific studies to indicate that paper trails are effective audits. This work describes a user study done to compare paper trails to audio audits, a new proposal for DRE auditing. Participants in the study completed four elections on a voting machine with a paper trail and four elections on a machine with an audio trail. There were purposeful mistakes inserted into the audits on some of the machines. Results from the study indicated that participants were able to find almost 10 times as many errors in the audio audit then they were able to find in the paper trail. Voters' attitudes towards the paper audit were extremely apathetic, and voters did not spend much time reviewing their paper record. When asked which type of audit voters would prefer for their own county elections, almost all voters preferred the VVPAT. These results indicate that newer alternative audit technology holds great promise in delivering a safe and accurate audit and further that paper trails have some significant design obstacles that need to be overcome before they will be effective audits.
by Sharon B. Cohen.
M.Eng.and S.B.
Young, Jill. "Analyzing E-voting (Electronic Voting) Outcomes: A Case Study of E-Voting in the State of Missouri." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/344.
Full textStenbro, Martine. "A Survey of Modern Electronic Voting Technologies." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10906.
Full textYu, Hong. "Creating Public Trust in Electronic Voting Systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224219.
Full textDet finns många positiva aspekter av elektroniska röstningssystem: säkerhet, verifierbarhet, bekvämlighet, resursbesparingar, och liknande. Emellertid så saknas det fortfarande hos allmänheten tillit till elektroniska röstningssystem. Ett av skälen till detta skulle kunna vara att idéerna i samband med elektronisk röstning är utmanande att förstå för allmänheten. I detta projekt har vi försökt att skapa allmän tillit med hjälp av ett förklaringssystem. Ett förklaringssystem tillverkades för att förklara hur ett modernt elektroniskt röstningssystem fungerar. Användartester utfördes därefter, för att verifiera huruvida detta förklaringssystem förmådde öka människors tillit till elektroniska röstningssystem. Efter analys av data insamlade genom användartesterna, fick vi lovande resultat som gav oss anledning att tro att detta slags förklaring kan användas för att skapa allmän tillit till elektroniska röstningssystem.
Costa, Miranda Núria. "Long-term privacy in electronic voting systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672120.
Full textAquest tesi es centra en la criptografia basada en reticles i com aplicar-la a la construcció de sistemes de votació electrònica post-quàntics. És el fruit de la recerca feta per l'autora de la tesi a Scytl en estreta col·laboració amb la Dra. Paz Morillo, del Departament de Matemàtica Aplicada de la UPC i en Ramiro Martínez, estudiant de doctorat. Com a part de la seva feina a l'empresa de vot electrònic Scytl, l'autora ha participat tant en el disseny de sistemes de votació electrònica com en la seva implementació, donant suport a l'equip de desenvolupament. No obstant, tots aquests sistemes utilitzen primitives criptogràfiques estàndard (primitives no basades en reticles) per assegurar que els requisits de seguretat es compleixen, i és per aquest motiu que un dels principals reptes d'aquest doctorat ha estat fer en recerca en un camp que no era familiar per l'autora, i contribuir-hi. Per altra banda, això ha permès a l'empresa endinsar-se en el món post-quàntic i participar en un projecte que té per objectiu implementar un sistema de vot electrònic basat en reticles. Aquest tesi consta dels següents continguts: una introducció a la teoria dels reticles on es descriuen alguns dels seus conceptes bàsics i els problemes computacionals dels quals depèn la seguretat dels criptosistemes basats en reticles. En aquesta primera part també es descriuen en detall aquells criptosistemes utilitzats en la construcció dels tres nous protocols presentats en aquesta tesi: un protocol basat en reticles resistent a la coacció i que ofereix verificabilitat “cast-as-intended”; una “mix-net post-quàntica” i una prova de coneixement nul totalment post-quàntica que permet demostrar que la barreja de vots s'ha realitzat correctament. El primer protocol és la versió basada en reticles d'un protocol ja existent i permet que el votant comprovi que el vot emès conté les opcions que havia seleccionat. El segon i el tercer protocol són el resultat de la recerca feta en el camp de les mix-nets basades en reticles. Es proposen dues construccions: la primera d'elles permet demostrar que un node de la mix-net ha barrejat i rexifrat una llista de xifrats RLWE sense modificar-los, però no es pot considerar totalment post-quàntica ja que la propietat de lligar de l'esquema de compromís utilitzat per construir la prova es basa en problemes computacionals clàssics. La segona construcció és totalment post-quàntica ja que tots els esquemes criptogràfics utilitzats en el seu disseny, és a dir, esquema de compromís i proves de coneixement nul, estan basats en reticles. Finalment, però no per això menys important, per aquesta segona proposta també es dóna una definició de seguretat i una prova de seguretat. L'última part de la tesi consisteix en construir un sistema de vot online post-quàntic, utilitzant com a components els protocols prèviament presentats i construccions ja existents basades en reticles. El sistema es considera segur en front atacs quàntics i ofereix privadesa a llarg plaç. També garanteix l'anonimat del vot, la seva autenticitat i integritat, verificabilitat individual i resistència a la coacció. Es descriuen en detall tant els algoritmes executats a cada fase com la interacció entre els seus participants. Com a part de la tesi no s'inclou cap implementació del sistema tot i que l'empresa està implementant un sistema de vot online basat en el que es presenta en aquesta tesi.
Aditya, Riza. "Secure electronic voting with flexible ballot structure." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16156/1/Riza_Aditya_Thesis.pdf.
Full textAditya, Riza. "Secure Electronic Voting with Flexible Ballot Structure." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16156/.
Full textKesselman, Andor. "Open Source and Electronic Voting: A New Strategy Toward Technical Procurement for Voting Systems." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/919.
Full textHerschberg, Mark A. (Mark Allan). "Secure electronic voting over the World Wide Web." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43497.
Full textIncludes bibliographical references (leaves 81-82).
by Mark A. Herschberg.
M.Eng.
Yang, Quentin. "Coercion-resistance in electronic voting : design and analysis." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0078.
Full textVoting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes elections, electronic voting does not yet provide the same level of security as paper voting. In particular, existing threats such as coercion and vote buying may increase and impact the results.In this thesis, we study academic solutions to address these phenomena, namely the notions of coercion-resistance and receipt-freeness.On these topics, we identify some limitations on the existing definitions and propose new definitions to model more attack scenarios.Besides these theoretical contributions, we propose practical strategies to eliminate certain risks, such as Italian attacks and vote buying. To this end, we develop a toolbox based on multi-party computation primitives, which allow different participants to evaluate a function on encrypted data. This leads to new methods for computing the tally, which counter Italian attacks thanks to the tally-hiding property. These methods can be applied to other types of voting than uninominal voting, such as preferential voting.With respect to vote buying, another contribution of this thesis is to generalize the notion of receipt-freeness so that it is more relateed to this threat, compared to existing notions. We also propose a modular solution that realizes this notion of receipt-freeness, and thus defeat vote buying. This solution relies on new encryption primitives, called traceable encryptions
McClendon, Jerome Gilbert Juan E. "A new approach to voting an accessible voter verifiable paper ballot /." Auburn, Ala, 2009. http://hdl.handle.net/10415/1813.
Full textProsser, Alexander, and Reinhard Steininger. "e-voting2006.at - An Electronic Voting Test Among Austrians Abroad." Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business, 2006. http://epub.wu.ac.at/360/1/document.pdf.
Full textSeries: Working Papers on Information Systems, Information Business and Operations
Yucel, Okan. "Auditable And Verifiable Electronic Voting With Homomorphic Rsa Tallying." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612292/index.pdf.
Full textPrê
t à
Voter: All-In-One&rdquo
scheme that utilizes mix-networks for anonymity. We present a case study considering 2007 Turkish Parliamentary Elections to demonstrate the effect of preferential voting on the election systems that have electoral barriers. After the mathematical formulation of the election procedure, we calculate the wasted votes in 2007 elections and present simulation results for 69 election regions (that have no independent parliament members) by using a combination of &ldquo
modified STV and d&rsquo
Hondt&rdquo
methods, according to four different, politically unbiased scenarios on the distribution of secondary vote choices. Additionally, we modify the &ldquo
Prê
t à
Voter: All-In-One&rdquo
scheme by proposing three security enhancing modifications in its ballot construction phase: 1) ballot serial number, 2) digital signature of the first clerk in the mix-net, 3) different random numbers for each row of the ballot. Finally, we demonstrate the potential of multiplicative homomorphic algorithms like RSA for homomorphic tallying. The idea is based on the association of each candidate on the electronic ballot with a prime number, and unique prime factorization of the general vote product. We propose novel randomization methods for homomorphic RSA tallying, and discuss the performance and complexity of the scheme with such randomizations. Our suggestion for an auditable and verifiable e-voting scheme that employs homomorphic RSA tallying with proper randomization has advantages over El Gamal and Paillier tallying, such as having the least encryption complexity and strong anonymity resistant to unlimited computational power.
Nielsen, Niels Bech. "Using electronic voting systems data outside lectures to support learning." Connect to e-thesis. Move to record for print version, 2007. http://theses.gla.ac.uk/46/.
Full textMSc. (R) thesis submitted to the Department of Computing Science, Faculty of Information and Mathematical Sciences, University of Glasgow, 2007. Includes bibliographical references.
Smart, Matthew James. "Anonymity vs. traceability : revocable anonymity in remote electronic voting protocols." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3386/.
Full textRogers, Gregory Gilbert Juan E. "In election voting, do people touch the objective or not?" Auburn, Ala, 2009. http://hdl.handle.net/10415/1721.
Full textMacdonald, Craig. "The voting model for people search." Thesis, University of Glasgow, 2009. http://theses.gla.ac.uk/609/.
Full textSwanepoel, Eranee. "A process model for e-voting in South Africa." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1012588.
Full textBorbély, Cornel. "Der Grundsatz der geheimen Abstimmung unter besonderer Berücksichtigung des E-Voting /." Bern : Stämpfli, 2005. http://www.uni.recht.ch/uni/lpext.dll/uni/ebook/Dissertation/Diss/Diss01/inhdiss01?f=templates&fn=index.html&2.0&vid=10.1082/Deu.
Full textMockus, Martynas. "Elektroniniai rinkimai ir jų teisinė aplinka." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050516_154420-43830.
Full textEscala, Ribas Alex. "Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2017. http://hdl.handle.net/10803/457585.
Full textEls sistemes de vot electrònic presenten molts reptes a causa dels seus múltiples requeriments. Alguns d'aquests reptes estan relacionats amb garantir la privacitat del votant i la transparència del sistema, requisits que són difícils de satisfer al mateix temps. D'altra banda, els sistemes de vot electrònic presenten altres reptes com la usabilitat, sobretot de cara als votants. En aquesta tesi estudiem dos problemes del vot electrònic. La verificabilitat "cast-as-intended" tracta d'obtenir mecanismes que garanteixin al votant que el seu vot correspon a les seves preferències. Les propostes actuals posen la càrrega de la verificació en el votant, cosa que no és desitjable en eleccions del món real, on participen votants amb diferents graus de coneixements tècnics. Nosaltres introduïm el concepte de "universal cast-as-intended verifiability", que proporciona mecanismes per a que qualsevol entitat de l'elecció pugui comprovar que qualsevol vot conté les preferències del votant que l'ha emès - sense revelar el contingut del vot. A banda de definir formalment el concepte de "universal cast-as-intended verifiability" també proposem un protocol de vot electrònic que satisfà aquesta propietat. L'altre problema que hem estudiat és el problema dels vots invàlids en eleccions electròniques. Un dels avantatges del vot electrònic és que permet evitar que els votants emetin vots nuls sense voler. Per això, si durant el recompte de l'elecció apareixen vots nuls construïts intencionadament es pot crear desconfiança en el sistema de vot. Els usuaris del sistema de vot poden pensar que el sistema té forats de seguretat o que ha estat atacat. Per evitar aquesta situació, definim el concepte de "vote validatability", una propietat dels sistemes de vot electrònic que garanteix que els vots nuls es poden identificar en el moment que s'emeten. En aquesta tesi hem definit formalment aquesta propietat i hem dissenyat un protocol que la satisfà. Tots aquests requisits de seguretat dels protocols de vot electrònic s'implementen amb eines criptogràfiques. Les principals eines que s'utilitzen són esquemes de xifrat, esquemes de firma i proves de coneixement zero. Una prova de coneixement zero permet a una entitat convèncer una altra entitat que una sentència és certa sense donar cap altra informació que la certesa de la sentència. Aquestes proves de coneixement zero es poden fer servir, per exemple, per demostrar que el recompte de l'elecció s'ha fet correctament. Recentment, Groth i Sahai han construït proves de coneixement zero que es poden fer servir per un ampli ventall de sentències com per exemple sentències que apareixen en protocols de vot electrònic. En aquesta tesi hem fet dos contribucions sobre les proves de Groth i Sahai. Per una banda donem un marc teòric que permet derivar hipòtesis criptogràfiques per construir protocols criptogràfics. En particular, construïm noves proves de Groth i Sahai millorant l'eficiència de les construccions existents. De manera independent, indiquem com les proves de Groth i Sahai es poden estendre per fer-les compatibles amb un ventall més ampli de sentències, millorem l'eficiència de les proves de Groth i Sahai per moltes d'aquestes sentències i, en particular, quan es fan servir per demostrar múltiples sentències.
Ciobâcǎ, Ştefan. "Verification and composition of security protocols with applications to electronic voting." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00661721.
Full textCiobâcǎ, Ştefan. "Verification and composition of security protocols with applications to electronic voting." Thesis, Cachan, Ecole normale supérieure, 2011. http://www.theses.fr/2011DENS0059/document.
Full textThis thesis is about the formal verification and composition of security protocols, motivated by applications to electronic voting protocols. Chapters 3 to 5 concern the verification of security protocols while Chapter 6 concerns composition.We show in Chapter 3 how to reduce certain problems from a quotient term algebra to the free term algebra via the use of strongly complete sets of variants. We show that, when the quotient algebra is given by a convergent optimally reducing rewrite system, finite strongly complete sets of variants exist and are effectively computable.In Chapter 4, we show that static equivalence for (classes of) equational theories including subterm convergent equational theories, trapdoor commitment and blind signatures is decidable in polynomial time. We also provide an efficient implementation.In Chapter 5 we extend the previous decision procedure to handle trace equivalence. We use finite strongly complete sets of variants introduced in Chapter 3 to get rid of the equational theory and we model each protocol trace as a Horn theory which we solve using a refinement of resolution. Although we have not been able to prove that this procedure always terminates, we have implemented it and used it to provide the first automated proof of vote privacy of the FOO electronic voting protocol.In Chapter 6, we study composition of protocols. We show that two protocols that use arbitrary disjoint cryptographic primitives compose securely if they do not reveal or reuse any shared secret. We also show that a form of tagging is sufficient to provide disjointness in the case of a fixed set of cryptographic primitives
Jawoszek, Ania Izabela. "The social construction of electronic voting in the UK, 1998-2005." Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547946.
Full textLoss, Leandro Augusto. "Iterative tensor voting for perceptual grouping of natural shapes in cluttered background." abstract and full text PDF (UNR users only), 2009. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3355589.
Full textYestekov, Yernat. "Design and Analysis of Novel Verifiable Voting Schemes." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407785/.
Full textVlachokyriakos, Vasileios. "Designing the vote : an exploration of electronic voting tool for political participation." Thesis, University of Newcastle upon Tyne, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.703276.
Full textProsser, Alexander, Robert Kofler, Robert Krimmer, and Martin Karl Unger. "e-Voting.at. Entwicklung eines Internet-basierten Wahlsystems für öffentliche Wahlen." Institut für Informationsverarbeitung und Informationswirtschaft, WU Vienna University of Economics and Business, 2002. http://epub.wu.ac.at/124/1/document.pdf.
Full textSeries: Working Papers on Information Systems, Information Business and Operations
King, Samuel O. "Evaluating the impact of electronic voting systems on university mathematics teaching and learning." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6702.
Full textTerelius, Björn. "Some aspects of cryptographic protocols : with applications in electronic voting and digital watermarking." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-165436.
Full textKryptografiska protokoll används i stor omfattning på internet, för att lösa allt från enkla uppgifter som nyckelutbyte och autentisering till komplexa problem som digitala pengar och elektroniska val. I den här avhandlingen är elektroniska val av speciellt intresse. I ett typiskt valsystem är målen att garantera att rösterna räknas korrekt och att ingen, inte ens valförrättaren, kan spåra en röst tillbaka till den röstande. Det finns flera metoder för att åstadkomma detta, men den mest generella är mixnät med ett så kallat ``proof of a shuffle'' för att garantera korrekthet. Vi föreslår i avhandlingen ett nytt, konceptuellt enkelt, ``proof of a shuffle''. Vi undersöker också ett mixnät som använder ett snabbt heuristiskt argument för korrekthet istället för ett ``proof of a shuffle''. Vi demonstrerar att både korrekthet och anonymitet kan angripas i det mixnätet. En version av samma mixnät användes i valet 2011 i Norge. Vi undersöker också ett enkelt bevis av kunskap om en diskret logaritm i en grupp. Det är sedan länge välkänt att just det protokollet kräver att gruppen har primtalsordning, men vi ger en karaktärisering av vad som händer i en grupp av sammansatt ordning. Vidare presenterar vi attacker mot en klass av protokoll med samma struktur, vilket visar att protokollet inte enkelt kan utvidgas till grupper av okänd eller sammansatt ordning. Slutligen studerar vi problemet med piratkopiering av film och musik. Det har föreslagits att vattenmärkning kan användas för att bädda in ett unikt vattenmärke i varje såld kopia. En säljare som upptäcker en piratkopia kan extrahera vattenmärket och därmed avslöja vilken köpare som läckte kopian. Existerande vattenmärkningssystem förutsätter att alla kopior laddas ner direkt från säljaren, men i praktiken vill säljaren ofta reducera mängden datatrafik genom att låta en ny betalande kund ladda ner kopian från tidigare köpare. Vi introducerar detta som ett intressant öppet problem och presenterar ett protokoll som tillåter överföring av data mellan köpare och som bara kräver att säljaren kommunicerar data proportionellt mot storleken på vattenmärket istället för mot storleken på filen.
QC 20150428
Chiu, Hua-Chou, and 邱華洲. "Receipt-Free Electronic Voting Schemes." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/85544958510380967438.
Full text國立交通大學
資訊科學系
89
When some members want to make a decision or a choose at large of them via an open Internet . Then , they will need a completely electronic voting scheme to protect voters’ privacy and achieve the voting system’s robustness , universal verifiability , and fairness , etc . Most of the electronic voting schemes that proprsed in the past , although they can achieve above properties , but , still exist some problems. That is , they will occur vote-buying event or vote-coercers’ violence . Because these schemes will let voters get a receipt about his vote , and this receipt can prove to another one what his vote is . In order to solving this problem , this thesis’s fruitful research result is to propose multi-authorities receipt-free voting schemes . And let them not only can achieve above voting requirements but also can achieve receipt-freeness property of a voting system. Furthermore, it giving voters more protection and the voting system more fairness .
Sun, Wei-zhe, and 孫偉哲. "Uncoercible Anonymous Electronic Voting System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82512566952959598131.
Full text國立中山大學
資訊工程學系研究所
94
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditional paper-based voting activities in some developed countries. A secure anonymous e-voting system has to satisfy many properties, such as completeness, tally correctness, and uncoercibility, where the uncoercibility property is the most difficult one to be achieved. Since each voter can obtain a voting receipt in an electronic voting system, coercion and bribe (vote-buying and vote-selling are included) become more and more serious in electronic voting environments than traditional paper-based voting environments. Unfortunately, most of the solutions, like receipt-freeness or untappable channels, proposed in the literature, are impractical owing to lack of efficiency or too complicated to be implemented. It will make uncoercible e-voting systems unacceptable by the people. In order to cope with the drawbacks of the previous schemes, this thesis will present a generic idea, which is independent of the underlying cryptographic components, on electronic voting to achieve the uncoercibility property and other requirements. The proposed method is an efficient and quite practical solution to match the current environments of electronic voting.
(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.
Find full textLanger, Lucie. "Privacy and Verifiability in Electronic Voting." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2313/2/Dissertation_Langer.pdf.
Full textLiu, Tai-Wai, and 劉泰瑋. "Timestamp-based Secure Electronic Voting System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/33625032943810980872.
Full text亞洲大學
資訊工程學系碩士班
100
Many countries even enterprises are trying to use electronic voting system because the issue of electronic voting has been discussed in recent years. A complete electronic voting system has some requirements as following. First, there is a perfect voting system to protect the privacy of voters during the voting. Second, the identification and voting content are not known by others. Third, the completeness, verifiability and equity of important essentials have to be maintained. During the electronic voting, the stability of voting system is an important element. The voting system cannot run because it’s not stable. The answers that members of parliament choose are not disclosed during deciding a policy because the purpose of the research is to protect the identification of member of legislative body by using the large-scale electronic voting system of all citizens to transfer to the small-scale legislative voting system. The complexity of several-times identification verification is concerned. The researcher develops the one-time verification of time token and largely decreases the severe loading of server in verification.
Tiwari, Mukesh. "Formally Verified Verifiable Electronic Voting Scheme." Phd thesis, 2021. http://hdl.handle.net/1885/227674.
Full textlee, Bing-Li, and 李秉禮. "Anonymous Electronic Voting Mechanism with Verifiable Ballots." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/25829692361350214860.
Full textChen, Chih Yang, and 陳智揚. "The Research for the Electronic Voting Mechanism." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/62224978372809661539.
Full text世新大學
資訊管理學系
89
Voting behavior has always been in our lives, and not only existed in elections. Therefore, when this behavior occurs frequently, it costs too much and lacks the effectiveness. An example like “Presidential election of America 2000”, shows the many un-solving problems that traditional paper voting has. Up to date, many researchers try to use information technology to achieve the same purposes that traditional voting does. It is called “Electronic voting”. Electronic voting can easily solve the cost problem, and take care of the problems that remain traditional paper voting happens. But the electronic voting still have some un-solving problems. For example, the problem includes completeness problem, uncoercibility problem, non-cheat problem, …, etc. In this paper, we propose a new electronic voting mechanism to solve the problems mentioned above. Furthermore, we also investigate what happen in the real world and solve them in practice.
Chang, Cheng-Wei, and 張政偉. "An Electronic Voting Scheme Using Memorable Password." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/43312739479847828699.
Full text國立交通大學
資訊科學系所
92
In general electronic voting scheme, every qualified voter owns one secret value. Every voter must use this secret value to generate ballot that can be verified successfully. Since the length of secret value is long and the content of secret value is hard to memory, we often put our own secret value in some kind of portable device, such as magnetic disc, compact disk, and smart card. However, we must afford the risk of losing the device. If the device is stolen or the secret value is revealed , attacker can forge ballot which can be verified successfully. To solve this problem, we combine electronic voting scheme and memorable password scheme. Even though attacker gets the secret value of some voter, he can’t generate legal ballot without relatively password.
Gwo-Ching, Fang, and 方國慶. "A Safety Scheme Research of Electronic Voting." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/86988791964059123725.
Full text國防管理學院
國防資訊研究所
88
The defectives of current election system are the weakness of our politic systems. The computer network voting is developed from the electronic secrete voting, i.e., the traditional voting on the basis of information technology. The voters can vote on the basis of private keys. Fairness and verifiability can be guaranteed by cryptology. In order to make the voting protocol closer to the traditional voting systems and to bring down the huge costs of labor and materials investment, this paper proposes the system of the life electronic voting. Given the hotness in election campaign, an attack may have chance to intrude on the electronic voting over network, e.g., forgery voting or identification of anonymous voting. This paper designs a safer mechanism for electronic voting and proposes the model of electronic voting. We try to quantify various attacking behaviors, analyze the associated functional dependence and find the possible attacking path between loss of adversary effort (LAE) and system weighted penalty (SWP). Then, we transform the path into matrix and analyze the risk of information system vulnerability. Given the critical path, the government is responsible for strengthening information security. Given the limited government financial resources, this paper provides a direction for the defense ability for electronic voting security.
Kuo, Chn-Jung, and 郭至容. "A New Voting Protocol With Electronic Board." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/64197675064742495072.
Full text國立交通大學
資訊管理研究所
82
With the development of computer networks, it''s feasible. to apply anonymous and verifiable voting on today''s computer networks. To protect the privacy of voters and prevent tally center from cheating, a voting protocol is needed. This research first enumerates the requirements of a just voting scheme. Protocols proposed to date are either too complex or do not meet all the requirements of a sound voting scheme. In this thesis, we propose a new voting protocol that has the following properties: (1)An electronic bulletin board is used to reveal the voting process to prevent the tally center from cheating; (2)The power of tally center is divided into two parts; (3)Voters'' privacy can be protected by using cryptography; (4)Each voter may check that his/her vote has been counted.