Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties

X Zou, H Li, Y Sui, W Peng, F Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
X Zou, H Li, Y Sui, W Peng, F Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2014ieeexplore.ieee.org
E-voting techniques and systems have not been widely accepted and deployed by society
due to various concerns and problems. One particular issue associated with many existing e-
voting techniques is the lack of transparency, leading to the failure to deliver voter
assurance. In this work, we propose an assurable, transparent, and mutual restraining e-
voting protocol that exploits the existing two-party political dynamics in the US. The
proposed e-voting protocol consists of three original technical contributions—universal …
E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated with many existing e-voting techniques is the lack of transparency, leading to the failure to deliver voter assurance. In this work, we propose an assurable, transparent, and mutual restraining e-voting protocol that exploits the existing two-party political dynamics in the US. The proposed e-voting protocol consists of three original technical contributions — universal verifiable voting vector, forward and backward mutual lock voting, and in-process check and enforcement — that, in combination, resolves the apparent conflicts in voting such as anonymity vs. accountability and privacy vs. verifiability. Especially, the trust is split equally among tallying authorities who have conflicting interests and will technically restrain each other. The voting and tallying processes are transparent to voters and any third party, which allow any voter to verify that his vote is indeed counted and also allow any third party to audit the tally.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果