Thursday, June 20, 2019

Survey on Security in Electronic Voting Systems Essay

Survey on Security in Electronic Voting Systems - Essay ExampleDue to this, the transcription provides uniqueness of votes ensuring that no voter can vote more than once. The receipt that the voter receives after casting a b every(prenominal)(prenominal)ot cannot be used to levy to any third party that they cast a specific vote with the intention to coerce them. The system also allows for the verification of individual votes to assure the voters that their votes create been accurately recorded. This can be achieved by inspecting both sides of the ballot paper and checking to see if the unique random number on the right to vote receipt is on the bulletin board. It also provides accountability such that third parties can confirm that the voting process was valid. The results are only released after the official counting is acquit to ensure fairness and to discourage malicious actions by observers. The end to end verification system which allows the detection of malicious behavio r at various stages of the voting process also reduces chances of invalid votes. The disadvantages of the system The main disadvantages of the system are the security issues involved in electronic voting. Data is susceptible to interruptions and alteration by the installation of viruses in online databases by operators with malicious intentions. There is also unequal access to the internet by voters due to unequal chances of acquiring equipment necessary for electronic voting. Due to the differences in salaries, some voters may be left out from the voting process. The system can be improved by several methods. The E-voting precis is only applicable for general elections with several contending candidates which feature the majority and plurality style election styles. The scheme can be improved to function in proportional representation. The system is however vulnerable. Parties that are entrusted to execute the algorithm of scheme may compromise the system to work in an abnormal wa y. The installation of a virus onto the databases could also lead to discrepancies in the results of the voting process. The article on a practical secret voting scheme for striking scale elections proposes a secret voting system which involves voters, an administrator and a counter which can be replaced with a public board as the participants of the process. It is applicable for a large scale election where it protects the privacy of the voter and ensures the fairness of the voting process regardless of the actions of the administrator and counter. Every voter has a unique ordinary key signature scheme while the administrator has a blind signature scheme. The counter is only tasked with the creation and publish of a list of ballots. The system has several advantages It solves the fairness and privacy issues portrayed in the previous methods of the encryption of files and sending of ballots through secret means of communication. The security of the scheme is ensured by the correct counting of all valid votes. The process is clear, sound and accountable and promotes fairness to discourage dishonesty in voters that would affect the process. The votes are kept private. The voters have to provide their credentials which ensures that every voter is qualified and to prevent the casting

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.