Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Using re-voting to reduce the threat of coercion in elections

Using re-voting to reduce the threat of coercion in elections Voter coercion, such as vote buying, has been minimised for decades with the private voting booth. Cellphone videos, absentee ballots, voter receipts and internet voting re-introduce the possibility of coercion because they are methods to prove a vote. This article presents a mathematical model of the voting process to show that giving voters the option to re-vote removes this proof because an observed vote is not necessarily final. Re-voting can also be used to spot threats such as viruses and Trojan horses that subvert voting machines. Re-voting mechanisms require cryptography techniques to separate user identifiers from votes cast, enabling the system to track votes by time without providing the specific identity of the user or the details of the vote cast. Mix-nets and homomorphic encryption provide the necessary tools. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Electronic Government, an International Journal Inderscience Publishers

Using re-voting to reduce the threat of coercion in elections

Loading next page...
 
/lp/inderscience-publishers/using-re-voting-to-reduce-the-threat-of-coercion-in-elections-K7HrZ6srqT

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1740-7494
eISSN
1740-7508
DOI
10.1504/EG.2010.030926
Publisher site
See Article on Publisher Site

Abstract

Voter coercion, such as vote buying, has been minimised for decades with the private voting booth. Cellphone videos, absentee ballots, voter receipts and internet voting re-introduce the possibility of coercion because they are methods to prove a vote. This article presents a mathematical model of the voting process to show that giving voters the option to re-vote removes this proof because an observed vote is not necessarily final. Re-voting can also be used to spot threats such as viruses and Trojan horses that subvert voting machines. Re-voting mechanisms require cryptography techniques to separate user identifiers from votes cast, enabling the system to track votes by time without providing the specific identity of the user or the details of the vote cast. Mix-nets and homomorphic encryption provide the necessary tools.

Journal

Electronic Government, an International JournalInderscience Publishers

Published: Jan 1, 2010

There are no references for this article.