A Synthesis of Vote Verification Methods in Electronic Voting Systems

A Synthesis of Vote Verification Methods in Electronic Voting Systems

Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita
Copyright: © 2014 |Pages: 23
DOI: 10.4018/978-1-4666-5820-2.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A large amount of research has been conducted to improve public verifiability of e-voting systems. One of the challenges is ensuring that different and apparently contradicting requirements are met: anonymity and representation, vote secrecy and verifiability. System robustness from attacks adds further complexity. This chapter summarizes some of the known vote verification techniques and highlights the pros and cons of each technique. Also, it reviews how different verification technologies cover different phases of the voting process and evaluates how these techniques satisfy the e-voting requirements.
Chapter Preview
Top

Voting Requirements

Several countries (e.g., the U.S. Federal Election Commission (FEC) Voting Systems Standard (VSS) (Federal Election Commission, 2002, 2005), Council of Europe (Council of Europe, 2004) and various researchers, e.g., (Volkamer, 2009; Antonyan et al., 2009), have defined requirements for voting systems and machines. These works contain a set of principles to ensure compliance with the principles of voting and, in many cases, with the local laws. These documents can also be classified according to the context in which the requirements are to be developed (e.g., paper-based voting or e-voting), the type of e-voting system addressed (e.g., DRE-based versus optical scan-based), the categories in which the requirements are classified, and the level of detail for the requirements. Some of the requirements, like: verifiability, integrity, privacy usability and accessibility, are related to the vote verification process. In the following, a brief description about these requirements is provided.

Complete Chapter List

Search this Book:
Reset