Electronic Governance Systems

Electronic Governance Systems

DOI: 10.4018/978-1-4666-1649-3.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

As one of applications in electronic governance, this chapter develops an electronic voting (e-voting) system. After discussing requirements for e-voting systems and reviewing existing approaches, an e-voting system is developed based on confirmation numbers and signature pairs. Here, e-voting systems must satisfy requirements intrinsically contradicting each other, e.g. they must convince anyone that votes from only and all eligible voters had been counted, but at the same time to protect voters from a coercer that forces voters to choose its supporting candidate, correspondences between voters and their votes must be concealed from anyone including election authorities and voters themselves. The developed e-voting system successfully satisfies these requirements. However, it must be noted that these requirement are satisfied under the assumption that at least one of mutually independent multiple authorities is honest.
Chapter Preview
Top

Requirements For E-Voting Systems

E-voting is one of anonymous security applications that attract most researchers because of its difficult challenges, i.e. to develop e-voting systems various requirements that intrinsically contradict each other must be satisfied. In practical aspect, e-voting systems are also one of most important applications. Namely in e-voting systems, voters cast their votes as electronic signals and votes are tallied by computers, therefore voting and tallying processes become efficient and accurate. In addition because ballot papers are replaced by electronic signals, physical resources required for voting can be reduced substantially, and moreover, supported by computer networks voters in remote places can participate in elections more easily. However, different from paper based voting systems where physically sealed ballot boxes and publicly disclosed tallying processes ensure the legitimate voting, in e-voting systems, everything is processed by computer programs that cannot be seen physically, and as a consequence, people cannot convince themselves that voting is legitimate, e.g. even when the computer program replaces some votes with different ones no one except the computer can notice that. Therefore simple mechanisms ruin all the above benefits of e-voting systems.

Here, ideal e-voting systems must preserve privacies of individual voters, must be able to convince people that the voting is accurate and fair, must disable any entity to coerce voters to choose a candidate it is supporting, and must be able to resolve disputes between voters and election administrators. Also, they must be robust against various intentional or accidental troubles, must be applicable to large-scale elections, and must be supported by practical assumptions. However, some of these requirements completely contradict each other, e.g. individual votes must be linked to their voters to convince people that all votes are legitimate, but these links reveal privacies of voters, also they enable an entity to coerce voters to choose its supporting candidate more reliably. To protect a voter from being coerced by other entities, any link between a voter and its vote must be concealed even from the voter itself.

Requirements for e-voting systems are summarized as follows.

  • 1.

    Privacy

Complete Chapter List

Search this Book:
Reset