共查询到19条相似文献,搜索用时 516 毫秒
1.
2.
电子投票是电子政务的一项重 要内容,它以密码学为基础,运用 现代计算机网络技术和通信技术来 实现投票功能。与传统的手工投票 方式相比,它提供了更高的效率和 更大的灵活性,不仅可以减少通常 投票活动在组织、计票和安全保密 等方面所需花费的大量人力和物 力,而且为投票者提供了极大的方 便性。 当前,我国已基本形成电子政 务建设的总体结构和总体技术框 架,其中,总体技术框架以公钥基 础设施(PKI)、授权管理基础设施 (PMI)、可信时间戳服务系统为基 础,其核心是PKI技术。本文利用PKI 及匿名通道协议,提出了一个基于 PKI的安全电子投票方案,该方案可 以方便、有效地在电子政务系统的 架构上来实现。 相似文献
3.
4.
本文简要介绍了用计算机和光机电器件组成计算机选举计票系统,在选举会议中实时处理选票,不易出错、省时、省力,可大大缩短会议时间。 相似文献
5.
6.
7.
8.
9.
10.
11.
Even when using a provably secure voting protocol, an election authority cannot argue convincingly that no attack that changed the election outcome has occurred, unless the voters are able to use the voting protocol correctly. We describe one statistical method that, if the assumptions underlying the protocol’s security proof hold, could provide convincing evidence that no attack occurred for the Norwegian Internet voting protocol (or other similar voting protocols). To determine the statistical power of this method, we need to estimate the rate at which voters detect possible attacks against the voting protocol. We designed and carried out an experiment to estimate this rate. We describe the experiment and results in full. Based on the results, we estimate upper and lower bounds for the detection rate. We also discuss some limitations of the practical experiment. 相似文献
12.
基于部分盲签名和散列链的安全电子投票方案 总被引:3,自引:2,他引:1
基于部分盲签名和散列链设计了一种新的电子投票方案。投票人被划分为不同类别.可以分别统计每一类投票人对问题的看法。大量信息采用公告栏的形式有较好的效率。同时利用单向哈希函数构造选票使投票人的计算量减小,大大简化了投票人的操作。实现该协议的计算量小,无论将投票人划分为多少个类别。协议所需的轮数不变,而且可以适应多种类型的选举。 相似文献
13.
Privacy is an important issue in electronic voting.The concept of ’full privacy’ in electronic voting was firstly proposed,not only the privacy of voters is concerned,but also the candidates’.Privacy preserving electronic election architecture without any trusted third party is presented and a general technique for k-out-of-m election based on distributed ElGamal encryption and mix-match is also provided.The voters can compute the result by themselves without disclosing their will and the vote of the losing candidates.Moreover,whether the vote of winner candidate is more than a half can be verified directly.This scheme satisfies ’vote and go’ pattern and achieves full privacy.The correctness and security are also analyzed. 相似文献
14.
《Distributed Systems Online, IEEE》2004,5(3)
The Pentagon's recent decision not to allow online voting in the upcoming US presidential election came as a blow to many e-voting proponents. Pentagon officials halted plans to roll out the Defense Department's Secure Electronic Registration and Voting Experiment during the upcoming general election after four prominent security researchers issued a report detailing the system's security vulnerabilities. Mock pilot elections can establish the efficacy, not to mention security, of online ballot casting. Sample votes can be garnered from online voters from one or two test states, several states, or abroad. And, as with most other Internet applications with optimum security concerns, further trials might also incorporate "white hat" hacker tests, in which "friendly" hackers attack the system and provide feedback to its developers. Pilot tests can also include using secure-access kiosks 相似文献
15.
Voting algorithms are used to provide an error masking capability in a wide range of highly dependable commercial & research applications. These applications include N-Modular Redundant hardware systems and diversely designed software systems based on N-Version Programming. The most sophisticated & complex algorithms can even tolerate malicious (or Byzantine) subsystem errors. The algorithms can be implemented in hardware or software depending on the characteristics of the application, and the type of voter selected. Many voting algorithms have been defined in the literature, each with particular strengths and weaknesses. Having surveyed more than 70 references from the literature, a functional classification is used in this paper to provide taxonomy of those voting algorithms used in safety-critical applications. We classify voters into three categories: generic, hybrid, and purpose-built voters. Selected algorithms of each category are described, for illustrative purposes, and application areas proposed. Approaches to the comparison of algorithm behavior are also surveyed. These approaches compare the acceptability of voter behavior based on either statistical considerations (e.g., number of successes, number of benign or catastrophic results), or probabilistic computations (e.g., probability of choosing correct value in each voting cycle or average mean square error) during q voting cycles. 相似文献
16.
Many studies on electronic voting evaluate their usability in the context of simple elections. Complex elections, which take place in many European countries, also merit attention. The complexity of the voting process, as well as that of the tallying and verification of the ballots, makes usability even more crucial in this context. Complex elections, both paper-based and electronic, challenge voters and electoral officials to an unusual extent. In this work, we present two studies of an electronic voting system that is tailored to the needs of complex elections. In the first study, we evaluate the effectiveness of the ballot design with respect to motivating voters to verify their ballot. Furthermore, we identify factors that motivate voters to verify, or not to verify, their ballot. The second study also addresses the effectiveness of the ballot design in terms of verification, but this time from the electoral officials’ perspective. Last, but not least, we evaluate the usability of the implemented EasyVote prototype from both the voter and electoral official perspectives. In both studies, we were able to improve effectiveness, without impacting efficiency and satisfaction. Despite these usability improvements, it became clear that voters who trusted the electronic system were unlikely to verify their ballots. Moreover, these voters failed to detect the “fraudulent” manipulations. It is clear that well-formulated interventions are required in order to encourage verification and to improve the detection of errors or fraudulent attempts. 相似文献
17.
Designs of hardware voters are presented that can be easily pipelined to accommodate extremely high data rates. Design strategies for bit-voters and word-voters are described. Examples of resultant designs are given and each design is evaluated with respect to cost and performance. Both ordinary and generalized m -out-of-n voting, with arbitrary vote assigned to the inputs, are considered. Median voters can be synthesized by simple variants of the design methods. Using currently available technology, these designs can operate at speeds of many millions of votes per second. For majority bit-voters with small values of n , a multiplexer-based design method generally yields the best realizations while for larger values of n , designs based on selection networks tend to be most efficient. For word voters, cost-effective designs based on modified or augmented sorting networks are feasible. In either case, the rich theory developed for the analysis and synthesis of parallel/pipelined sorting networks directly benefits the design process 相似文献
18.
In high reliability systems, the effectiveness of fault tolerant techniques, such as Triple-Modular-Redundancy (TMR), must be validated with respect to the faults that are likely in the current technology. In todays' Integrated Circuits (IC), this is the case of crosstalks, whose importance is growing because of device & interconnect scaling. This paper analyzes the problem of crosstalk faults at the inputs of voters in TMR systems. In particular, possible problems are illustrated, and it is shown that such crosstalk may invalidate the reliability of both voting, and diagnosing operations. The problem is analyzed from a probabilistic point of view. Its occurrence is estimated by using a set of TMR systems obtained with combinational benchmarks as functional modules. The possible problems of such operations are discussed in the presence of crosstalk faults. It is shown that crosstalk may invalidate the reliability of both voting, and diagnosis operations. A probabilistic model of the voting & diagnosis operations in the presence of crosstalk has been developed. Finally, such a model has been used to estimate the probability of voting & diagnosis failures in a set of TMR systems obtained by using combinational benchmarks as functional modules. We have shown that the presence of crosstalk faults at voter inputs may impair both the voting, and the diagnosis mechanisms. This problem has been quantified by applying a probabilistic model of crosstalk fault effects on voting and diagnosis to a set of benchmark circuits. Results show that crosstalk may create a reliability problem for TMR systems. Such a problem can be solved by using on-line testing or design for testability providing additional controllability & observability to the replicated functional units. 相似文献
19.
In this work, we describe an experiment for evaluating the integrity of election results, and improving transparency and voter participation in electronic elections. The idea was based on two aspects: distributed collection of poll tape pictures, taken by voters using mobile devices; and crowdsourced comparison of these pictures with the partial electronic results published by the electoral authority. The solution allowed voters to verify if results were correctly transmitted to the central tabulator without manipulation, with granularity of individual polling places. We present results, discuss limitations of the approach and future perspectives, considering the context of the previous Brazilian presidential elections of 2014, where the proposed solution was employed for the first time. In particular, with the aid of our project, voters were able to verify 1.6 % of the total poll tapes, amounting to 4.1 % of the total votes, which prompted the electoral authority to announce improved support for automated verification in the next elections. While the case study relies on the typical workflow of a paperless DRE-based election, the approach can be improved and adapted to other types of voting technology. 相似文献