2014 23rd International Conference on Computer Communication and Networks (ICCCN) 2014
DOI: 10.1109/icccn.2014.6911807
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy and comparison of remote voting schemes

Abstract: Remote voting has been an active research field for application of cryptographic techniques in the last two decades with many schemes and systems in publication. In this paper we present an overview of recent efforts in developing voting schemes and security models that involve a variety of real world constraints to ensure election integrity. We classify voting schemes based on their primary cryptographic techniques. We analyze recent typical schemes and systems against the basic and counter attack requirement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…Other interesting systems are: Netvote [17], OV-net [21], Follow My Vote [29] , Polys [2] and Colony [23]. A more comprehensive comparison of voting protocols can be found in [18], [31].…”
Section: Introductionmentioning
confidence: 99%
“…Other interesting systems are: Netvote [17], OV-net [21], Follow My Vote [29] , Polys [2] and Colony [23]. A more comprehensive comparison of voting protocols can be found in [18], [31].…”
Section: Introductionmentioning
confidence: 99%
“…Such analysis shows difference among these security requirements and aids in design of future schemes. Our conclusion is provided regarding suitability of a particular voting system/scheme under various conditions [11].…”
Section: IImentioning
confidence: 99%
“…Remote E-voting systems, as voting systems, are supposed to have basic functional properties, such as correctness, democracy, fairness, accountability and transparency [19] [18] [15]. However, in this paper we mainly focus on the following properties related to security.…”
Section: Security Properties Of Remote E-voting Systemsmentioning
confidence: 99%
“…Although we mentioned receipt-freeness, the focus of interest of [19] is to provide a general survey for existing remote Evoting systems' primary cryptographic techniques: mix-nets, blind signature, threshold homomorphic encryption and secret sharing. In this paper, we specifically focus on three important security properties related to voters: receipt-freeness, voteselling resistance and voter-coercion resistance.…”
mentioning
confidence: 99%
See 1 more Smart Citation