2021
DOI: 10.15587/1729-4061.2021.238259
|View full text |Cite
|
Sign up to set email alerts
|

Development of audit and data protection principles in electronic voting systems

Abstract: It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. An… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…In case of distrust of the standard audit server, the provider must assist voters to install an additional audit server. The principle of operation of the audit server is described in detail in [10]. For voters to access the audit server, the https protocol is recommended in order to neutralize the attack of an intermediary.…”
Section: Fig 10 the Results Of Running The Ifconfig Commandmentioning
confidence: 99%
See 2 more Smart Citations
“…In case of distrust of the standard audit server, the provider must assist voters to install an additional audit server. The principle of operation of the audit server is described in detail in [10]. For voters to access the audit server, the https protocol is recommended in order to neutralize the attack of an intermediary.…”
Section: Fig 10 the Results Of Running The Ifconfig Commandmentioning
confidence: 99%
“…As pointed out in [10], this is easily identified by publishing data on the number of voters for each street within a polling station, for each house within a street, and for each apartment within a house. Then the voters themselves will find extra residents in their apartments, extra apartments in their houses and extra houses on their streets without the use of technical means.…”
Section: Computer Sciencesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, these methods only apply to cryptocurrencies that do not require permissions. On the other hand, some other approaches were extended to all workloads but depended only on trusted hardware to reduce communication overhead [ 192 ].…”
Section: Analysis and Discussionmentioning
confidence: 99%