Academia.eduAcademia.edu

Electronic Voting System

description9 papers
group0 followers
lightbulbAbout this topic
An electronic voting system is a technology-based method for casting and counting votes in elections, utilizing electronic devices and software to facilitate the voting process, enhance accuracy, and improve accessibility while ensuring security and integrity of the electoral process.
lightbulbAbout this topic
An electronic voting system is a technology-based method for casting and counting votes in elections, utilizing electronic devices and software to facilitate the voting process, enhance accuracy, and improve accessibility while ensuring security and integrity of the electoral process.

Key research themes

1. How can blockchain technology advance the security, transparency, and auditability of electronic voting systems?

This research area investigates the application of blockchain technology and smart contracts to build secure, tamper-proof, and transparent electronic voting systems. Blockchain’s immutable ledger and decentralized consensus mechanisms provide novel ways to guarantee vote integrity, voter anonymity, and system auditability, potentially addressing many traditional electronic voting security challenges.

Key finding: This study proposes a Python-based blockchain voting system that uses smart contracts on the Ethereum blockchain to secure and automate vote management, ensuring voter anonymity and preventing fraudulent activity. The system... Read more
Key finding: This paper demonstrates a blockchain-based electronic voting system that leverages decentralized ledger technology for transparency, immutability, and non-repudiation. It emphasizes that blockchain’s properties, including... Read more

2. What design considerations and functional requirements are critical for building secure, user-friendly electronic voting systems?

This theme covers the architectural and functional design aspects of electronic voting systems, focusing on security requirements, usability, transparency, voter privacy, and system integrity. The research addresses compliance with democratic principles (eligibility, secrecy, accuracy), ensuring that e-voting systems can be effectively deployed and accepted by the voting populace.

Key finding: This design study based on Ghana’s electoral process presents an online voting system (OVIS) focusing on voter privacy, user-friendliness, and tamper-proof features to replace outdated manual methods. It highlights the... Read more
Key finding: This work developed a web-based electronic voting system utilizing PHP and MySQL aimed at automating election results and improving voter and election officer modules. Tested for system usability, it showed above-average... Read more
Key finding: This chapter systematically identifies both functional requirements (eligibility, single vote counting, secrecy, result verification) and non-functional security requirements (accuracy, democracy, privacy) grounded in... Read more

3. What are security vulnerabilities in current authentication protocols for electronic voting, and how can cryptographic techniques improve trust and privacy?

This research explores security threats in electronic voting—such as impersonation, relay, and manipulation attacks—focusing on authentication protocols and cryptographic primitives like blind signatures and distance bounding. The theme emphasizes analyzing and enhancing cryptographic protocols to preserve voter anonymity, message integrity, and prevent attacks that undermine election fairness and trustworthiness.

Key finding: This paper revealed critical vulnerabilities in the Pasargad distance bounding protocol designed for RFID-based e-voting systems, including impersonation and key recovery attacks. Their cryptanalysis demonstrated that despite... Read more
Key finding: The study simulates electronic voting systems incorporating blind signature schemes, comparing traceable and untraceable variants (Chaum’s and Hwang et al.'s schemes). It emphasizes that untraceable blind signature schemes... Read more

All papers in Electronic Voting System

This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: 'traditional BS based electronic voting system (EVS)' and 'traditional offline electronic... more
We propose a peripheral authentication scheme for autonomous vehicles. A mutual authentication protocol is required to secure every peripheral device access to a vehicle. Specifically, we present a vehicle to peripheral device... more
This paper examines the various different types of electronic voting systems, and distinguishes between electronic machine voting and electronic distance voting. The prospects of electronic voting systems are unclear; this paper observes... more
This case study aims at ensuring preservice science teachers to acquire experience by creating paper-based mind maps (PB-MM) and digital mind maps (D-MM) in technology education and to reveal their opinions on these mind mapping... more
This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: 'traditional BS based electronic voting system (EVS)' and 'traditional offline electronic... more
In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The... more
This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: ‘traditional BS based electronic voting system (EVS) ’ and ‘traditional offline... more
In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The... more
Distance bounding protocols are launched based upon the round trip time measurements of the carried out messages to defend RFID systems against the relay attack. In such protocols, the reader authenticates tags and also estimates an upper... more
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a... more
This case study aims at ensuring preservice science teachers to acquire experience by creating paper-based mind maps (PB-MM) and digital mind maps (D-MM) in technology education and to reveal their opinions on these mind mapping... more
Electronic voting system used in the study, primary and secondary schools (Elektroy-EOS) use, and on the contributions of the educational environment using the system to investigate teachers' views. Case study used qualitative research... more
In this research, it is aimed to investigate in depth the thoughts and practices of primary teachers regarding the practice of dialogical teaching. This research is designed as a phenomenological. Within the scope of the study, the... more
Dear Colleagues It is an honour for us to welcome you as Editors of Cypriot Journal of Educational Sciences which has accepted publications since 2006 and is indexed in qualified databases. Cypriot Journal of Educational Sciences (CJES)... more
Electronic voting system used in the study, primary and secondary schools (Elektroy-EOS) use, and on the contributions of the educational environment using the system to investigate teachers' views. Case study used qualitative research... more
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicinity by surreptitiously forwarding the signal between the... more
Distance-Bounding identification protocols aim at impeding man-in-themiddle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where the adversary relays communication... more
In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The... more
Electronic voting system used in the study, primary and secondary schools (Elektroy -EOS) use, and on the contributions of the educational environment using the system to investigate teachers' views. Case study used qualitative research... more
Electronic voting system used in the study, primary and secondary schools (Elektroy -EOS) use, and on the contributions of the educational environment using the system to investigate teachers' views. Case study used qualitative research... more
Abstract: Many distance bounding protocols appropriate for RFID technology have been proposed recently. However, the design and the analysis of these protocols are not based on a formal perspective. Motivated by this need, a formal... more
The learning environment plays an important role in how students perceive information and how they learn. Models and methods have changed over the years influenced by greater student diversity in addition to national HE strategic agendas.... more
Abstract. The communication between an honest prover and an honest verifier can be intercepted by a malicious man-in-the-middle (MiM), without the legitimate interlocutors noticing the intrusion. The attacker can simply relay messages... more
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a... more
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as... more
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated... more
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as... more
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a... more
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated... more
Download research papers for free!