E-Vote: A Cloud-Based Electronic Voting System for Large-Scale Election

E-Vote: A Cloud-Based Electronic Voting System for Large-Scale Election

Ionut-Mihai Posea, Marius Ion, Florin Pop, Decebal Popescu, Nirvana Popescu
Copyright: © 2016 |Pages: 26
ISBN13: 9781466686298|ISBN10: 1466686294|EISBN13: 9781466686304
DOI: 10.4018/978-1-4666-8629-8.ch008
Cite Chapter Cite Chapter

MLA

Posea, Ionut-Mihai, et al. "E-Vote: A Cloud-Based Electronic Voting System for Large-Scale Election." Cloud Computing Technologies for Connected Government, edited by Zaigham Mahmood, IGI Global, 2016, pp. 188-213. https://doi.org/10.4018/978-1-4666-8629-8.ch008

APA

Posea, I., Ion, M., Pop, F., Popescu, D., & Popescu, N. (2016). E-Vote: A Cloud-Based Electronic Voting System for Large-Scale Election. In Z. Mahmood (Ed.), Cloud Computing Technologies for Connected Government (pp. 188-213). IGI Global. https://doi.org/10.4018/978-1-4666-8629-8.ch008

Chicago

Posea, Ionut-Mihai, et al. "E-Vote: A Cloud-Based Electronic Voting System for Large-Scale Election." In Cloud Computing Technologies for Connected Government, edited by Zaigham Mahmood, 188-213. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8629-8.ch008

Export Reference

Mendeley
Favorite

Abstract

The electoral system is an essential element for the survival of the democracy. Efforts are being made to develop voting systems that are convenient, reliable, transparent and secure. However, considering the security problems that can occur using the underlying technologies, it is difficult to construct an impenetrable system. This chapter presents e-Vote, a distributed electronic voting system architecture that is designed to ensure the accuracy, privacy, verifiability, convenience, and the openness of the democracy of a large-scale electoral process. We describe the necessary requirements for the e-voting protocol, and propose a cryptographic voting scheme that achieves them. The e-voting protocol makes use of several well-established cryptographic primitives e.g. symmetric and asymmetric encryption, digital signatures, blind signatures and secret sharing. Using the suggested framework, we also demonstrate an approach using the current computing and network technologies to effectively describe an architecture that can support a computationally secure and reliable voting process.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.