Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2007)
Statement on Electronic Voting, from http://www.notablesoftware
Alan Smith (2007)
Securing e-voting as a legitimate option for e-governanceElectron. Gov. an Int. J., 4
(2002)
This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
D. Gooch (2011)
Communications of the ACMXRDS, 18
M. Fischetti (2008)
Competing candidates.Scientific American, 299 4
Lichun Chiang (2009)
Trust and security in the e-voting systemElectron. Gov. an Int. J., 6
Rebecca Mercuri, P. Neumann (2003)
Security by obscurityCommun. ACM, 46
Roy Saltman (1988)
Accuracy, integrity and security in computerized vote-tallyingCommun. ACM, 31
(2009)
We do not trust machines: the people reject electronic voting
D. Chaum, R. Carback, Jeremy Clark, A. Essex, Stefan Popoveniuc, R. Rivest, P. Ryan, Emily Shen, A. Sherman (2008)
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
R. Carback, D. Chaum, Jeremy Clark, John Conway, A. Essex, P. Herrnson, Travis Mayberry, Stefan Popoveniuc, R. Rivest, Emily Shen, A. Sherman, P. Vora (2010)
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
S. Delaune, S. Kremer, M. Ryan (2009)
Verifying privacy-type properties of electronic voting protocols
K. Thompson (1984)
Reflections on trusting trustCommun. ACM, 27
Rebecca Mercuri, P. Neumann (2003)
Verification for Electronic Balloting Systems
D. Chaum, A. Essex, R. Carback, Jeremy Clark, Stefan Popoveniuc, A. Sherman, P. Vora (2008)
Scantegrity: End-to-End Voter-Verifiable Optical- Scan VotingIEEE Security & Privacy, 6
E. Magkos, P. Kotzanikolaou, C. Douligeris (2007)
Towards secure online elections: models, primitives and open issuesElectron. Gov. an Int. J., 4
Tadayoshi Kohno, A. Stubblefield, A. Rubin, D. Wallach (2004)
Analysis of an electronic voting systemIEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
Gerald Post (2010)
Using re-voting to reduce the threat of coercion in electionsElectron. Gov. an Int. J., 7
Rebecca Mercuri (2002)
A better ballot boxIEEE Spectrum, 39
D. Chaum (2004)
Secret-ballot receipts: True voter-verifiable electionsIEEE Security & Privacy Magazine, 2
This paper describes Scantegrity, an electronic voting system developed by Chaum et al. (2008b), and it analyses Scantegrity’s ability to satisfy the goals of privacy and verifiability. The paper describes a programmatic attack on Scantegrity and presents findings in the form of program output for a corrupted hypothetical election. The attack takes advantage of the inherent vulnerability of electronic voting systems due to the tension between the goals of privacy and verifiability. It exposes a security weakness in electronic voting systems, and it establishes the need to control code compilation and provide physical security for that compiled code throughout the election process.
Electronic Government, an International Journal – Inderscience Publishers
Published: Jan 1, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.