Review of Literature and Studies
Review of Literature and Studies
Review of Literature and Studies
be available on a site (attached to the system) for all stakeholders to view progress, hence
insuring transparency (Oyite David Robinson Et Al, 2011).
Other researchers have done work in electronic voting; while they may not
explicitly mention voting from remote poll sites, their work is nonetheless relevant to any
effort at designing or implementing a remote poll site voting system. Lorrie Cranor could
be classified, like the CALTECH/MIT researchers, as a cautious optimist. She
acknowledges the problems inherent in each kind of voting apparatus, but doesnt make
an overt recommendation on her site for one technology over the rest. Peter Neumann
gives a list of suggestion for generic voting criteria which suggests that a voting system
should be so hard to tamper with and so resistant to failure that no commercial system is
likely to ever meet the requirements, and developing a suitable custom system would be
extremely difficult and prohibitively expensive.
In the electoral context, a system failure, or perceived failure, might at least
temporarily, or for a number of years, result in state authority being exercised by office
holders who have not legitimately earned it, or might erode public confidence in whether
authority is legitimately held. As one of the critics of Internet voting pointed out, "All an
attacker has to do is to create the impression that something went very wrong. The losing
candidate will do the rest" (Rubin 2007, 2). Not all of the risks involve actual
manipulation or problems with the integrity of votes cast. A denial of service attack, such
as happened against the New Democratic Party (NDP) in March 2012 when online voting
in its leadership contest was slowed for several hours, risks disenfranchising voters if it
can temporarily overwhelm the system and render it unusable for authorized voters (Geist
2012).
The E-voting is generally any type of voting that involves electronic means (IPI,
2003). It can also be defined as any mechanism to cast a vote or to participate in election,
by which the relevant data are transmitted over a network (internet or mobile network)
(Voutsis and Zimmerman, 2005).
E-voting schemes, according to Wang (2005), are the schemes of voting through
digital devices, in particular through computers, and via the internet in many cases.
One category of e-voting is describe by Connolly (2004) as Electronic Distance
Voting where a voter can use technology such as interactive digital TV, telephone, Short
Message Service (SMS) or the internet to cast their vote from any preferred place. This is
similar to remote electronic voting (Rubin, 2002), an election process whereby people
can choose to cast their votes over the internet, most likely through a web browser, from
home, or any other location where they have internet access.
Two types of election are identified by Rubin (2002) as private and public
elections. Private elections are limited to those involving stock proxies and boards of
directors within companies, whereas public elections are on the scale of national election
in a country. Another type of election identified by Rjaskova (2003) is l-out-of-L voting,
where the voter has L possibilities and can only choose one of them. Rjaskova further
differentiates between equal voting where each voter can vote only once and their vote
counted once, and weighted voting where the vote of the voter Vi is counted w, times. An
implementation of an electronic voting system supporting vote weights is carried out by
Elliason and Zuquete (2006).
A variety electronic voting protocols for the internet have been suggested and
there exist simulations for some of them. This section discuss select electronic voting
protocols.
Mixnet
based
schemes,
presented
by
Chaum(1981)
and
This schemes prevent vote buying and voter coercion by providing the voter with
private verifiability where only they know how the encrypted votes have been shuffled,
but they have no way of proving the content of their vote to a third party.
A
description
of
homomorphic
encryption
is
given
by
Damgard,
the voters digital signature for authentication. (Diffie-Hellman) key exchange and
password-based encryption are also used in this scheme.
Rjaskova (2003) notes that schemes using blind signatures are popular due to their
efficiency. However the voter has to participate in more rounds, that is, registration,
voting and verification. The blind signature protocol is appropriate for implementation in
contexts having limited computational capability. As a result, it was selected for use in
this project.
An anonymous channel is a communication channel that allows the
communicating entities to remain anonymous throughout the communication (Feng et al.,
2005).