1 The Evolution of Internet Voting By Ka Ling Cheung.

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Online Voting System State Election Commission, Gujarat
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Why Audit for Transparency Lillie Coney National Committee for Voting Integrity Minneapolis, MN October 26, 2007.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Online Voting Presented By: George Oham George Olajide
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
A Pairing-Based Blind Signature
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Registration Must register at least 25 days before the election You can register by mail, or at post offices, DMVs, libraries, and schools Must submit.
Administration of Absentee Ballot Programs Barry C. Burden (University of Wisconsin) Brian J. Gaines (University of Illinois)
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Election Administration during Natural Disasters and Emergencies: Hurricane Sandy and the 2012 Election Robert M. Stein Rice University Prepared for presentation.
Principles of Information Security, 2nd edition1 Cryptography.
Ronald L. Rivest MIT Laboratory for Computer Science
Internet Voting David Jefferson Compaq Systems Research Center 130 Lytton Ave. Palo Alto, CA 94301
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Voting Naked: A Feasible Election System or Just a Recurring Nightmare Presented by: Danita McRae Daniel Bramell.
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
Chapter 10 Section 1: p  Early America: most voters were white, adult males who owned property ◦ White adult males who could not afford property,
XXXI Reunió Cercle d’Economia a Sitges 29 de maig de 2015 Pere Vallès CEO de Scytl L’Ambició d’Emprendre.
Voting System Qualification How it happens and why.
Static Validation of a Voting ProtocolSlide 1 Static Validation of a Voting Protocol Christoffer Rosenkilde Nielsen with Esben Heltoft Andersen and Hanne.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
Topic 2: Voting & Elections (Part 2). Part 3: Nominations Why is the nominating process a critical first step in elections? Describe the self-announcement,
12/9-10/2009 TGDC Meeting Vote-by-Phone David Flater / Sharon Laskowski National Institute of Standards and Technology
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Chapter 7: The Electoral Process Section 2
04/06/ Applications on Wireless Platform Ulpiano Conde González.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
 An election held before the general election  Voters choose members of their political party to run for public office in the general election  Candidates.
Understanding & Use of the Internet E-government Spring 2011 G. F Khan, PhD.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
Securing Digital Democracy Carsten Schürmann, DemTech, IT University of Copenhagen.
The Electoral Process Chapter 7.
What is a caucus?. The two main US parties use caucus meetings and primary elections to select a candidate to put forward for the Presidential Election.
William H. Bowers – Ethics for the Information Age Chapter 6.5 – Online Voting.
Online Voting : A New Beginning State Election Commission, Gujarat Prototype explaining concept Note: Actual screens on the day of voting may be different.
The Administration of Elections Extent of Federal control Elections need to be free, honest, and accurate Most election law in the U.S. is State Law.
1 CSE Cryptography and Security Ten H. Lai Autumn 2009.
WHO CAN VOTE?. VOTING RIGHTS DENIED Voting in America has changed dramatically since the birth of our nation. Initially, many groups were denied that.
Warm Up In the Voting Rights Act of 1965, when certain state required preclearance, what needed to happen before a state could change its voting laws?
Let’s talk about voting Meagan Smith, M.S. │Office of Active Citizenship and Service.
E-Government, E-Voting, and the Future Jordan Weiler.
Goal 4- Political Parties. Qualifying to Vote Voting is an important right of American citizenship, without it citizens cannot choose who will run their.
VOTING Who can vote? Why should you vote?. I. Voting in the Past a. During our nation’s early years, most voters were white, adult property owning males.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
Secure, verifiable online voting 29 th June 2016.
10.1 Who Can Vote? Civics and Economics.
Who can vote?.
Part 3: Nominations.
Ronald L. Rivest MIT Laboratory for Computer Science
Fayette Co. School Corporation
At the polls on Election Day
ELECTRONIC PAYMENT SYSTEM.
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Pima Medical Institute Online Education
The Italian Academic Community’s Electronic Voting System
Chapter 7: The Electoral Process Section 2
Voting: how to register and cast your vote
Qualifications and Procedures for Voting
Chapter 7 Section 2.
Voting: how to register and cast your vote
Presentation transcript:

1 The Evolution of Internet Voting By Ka Ling Cheung

2 Introduction The transition from punch cards to one- click voting is rapidly approaching. Industry analysts predict the 2000 election may be the last presidential election to only offer in-person voting and absentee ballots. Many voters are ready to embrace digital democracy and see Internet voting as a natural next step in electronic elections technology.

3 Topics of Discussion Encryption Two phases of internet voting Different methods of internet voting Key requirements for a voting system Barriers to entry

4 Encryption Figure 1: Symmetric Encryption protocol Figure 2 Public Key Encryption Protocol

5 Poll-Site Voting An election in which internet voting stations are made available at conventional poll-sites where access and security area controlled as they are today. These could also include schools and libraries where internet access is already available.

6 Remote-Site Internet Voting The ability for voters to cast their ballots from anywhere an internet connection is available, such as home or office.

7 Different Methods E-commerce Trusted Authority Individual Verifiable Universally Verifiable

8 Requirement of online voting Eligibility Uniqueness Privacy Soundness Flexibility Verifiability Non-Coercibility Revisability Convenience Mobility Efficiency

9 Barriers Lack of common standards across states Inefficient of changing election laws to cover new voting methods. Time and cost of certifying a voting system in multiple states. Digital divide.

10 Summary Online voting systems have been under consideration in the cryptographic literature since the early 1980’s. From the literature,two main secure methods have emerged, individually verifiable methods and universally verifiable elections. Although both meet privacy requirements, individually verifiable election systems require voters to verify their votes, which is often unlikely.Universally verifiable elections allow any observer to verify the integrity of the election without violating voter privacy.