Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance 2011
DOI: 10.1145/2072069.2072071
|View full text |Cite
|
Sign up to set email alerts
|

Measures to establish trust in internet voting

Abstract: Technical research has achieved strong advances in addressing security concerns in internet voting, yet the solutions are complicated and difficult to explain to the public. Accordingly, internet voting commonly faces opposition despite the benefits voters and authorities may expect. It appears that security features are only one premise underlying a system's acceptance among the electorate. The other challenge is to exploit these features at establishing the required trust among the public. In this paper we i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(29 citation statements)
references
References 7 publications
0
29
0
Order By: Relevance
“…E-governance also focuses on aspects that are relevant to internet voting, such as transparency, evaluation according to international standards, separation of duty, verifiability, vote updating, etc. to establish trust among the public [28], [31].…”
Section: A the Economy Of Truth In The It Community's Perspectivementioning
confidence: 99%
“…E-governance also focuses on aspects that are relevant to internet voting, such as transparency, evaluation according to international standards, separation of duty, verifiability, vote updating, etc. to establish trust among the public [28], [31].…”
Section: A the Economy Of Truth In The It Community's Perspectivementioning
confidence: 99%
“…Stage 7 -Verifying (election) key generation: The smartphone displays the hash value 12 of the public key it computed during the distributed key generation protocol. The instructions for all election authorities are to compare the displayed value with the one displayed on the WBB.…”
Section: Stage 4 -Starting the Applicationmentioning
confidence: 99%
“…11 In the application the passphrase is called security phrase as pre-studies show that people do not know what passphrase means here. 12 In the application this hash value is called security code for the purpose of understandability. 13 The vote casting process is out of scope of our project.…”
Section: B Tallying Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Estonia is not the only country having evaluated Internet voting for politically relevant elections, yet it can certainly represent the whole category of government-sponsored Internet voting systems, having the longest history of development and usage of such systems. Moreover, comparative analyses show many similarities with other nations' alternatives [23,11,21]. The Estonian Internet voting system is meant to supplement the traditional methods of voting.…”
Section: Three Approaches To Internet Votingmentioning
confidence: 99%