2022
DOI: 10.51408/1963-0085
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Voting System Essentials and Problems

Abstract: The development of reliable and safe e-voting systems is relevant because of the wide range of applications. This paper provides an analysis of modern electronic voting systems based on security criteria. An analysis was conducted based on the most popular modern e-voting system architectures. The analysis provides a baseline for developing a secure e-voting system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Many models have been suggested and used but, unfortunately, a lot of vulnerabilities have been found in a comparative analysis of the most widely used e-voting approaches in [7]. Based on these vulnerabilities, a model was suggested in [8] that addresses them, but one of the most important issues still remains -secure data transfer from the storage server that keeps all the votes, to the counting server that should count them anonymously. Modern systems rely on physical copies of data and are transferred manually, which is a major security issue and, thus, the usage of steganography methods is explored for that step.…”
Section: Fig 2 Steganography Methodsmentioning
confidence: 99%
“…Many models have been suggested and used but, unfortunately, a lot of vulnerabilities have been found in a comparative analysis of the most widely used e-voting approaches in [7]. Based on these vulnerabilities, a model was suggested in [8] that addresses them, but one of the most important issues still remains -secure data transfer from the storage server that keeps all the votes, to the counting server that should count them anonymously. Modern systems rely on physical copies of data and are transferred manually, which is a major security issue and, thus, the usage of steganography methods is explored for that step.…”
Section: Fig 2 Steganography Methodsmentioning
confidence: 99%