Design and Analysis of Novel Verifiable Voting Schemes Page: 29
View a full description of this thesis.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
a)
b)
Figure 3.6: Attack on legitimacy. (a) The result of a election is a tie. (b) The adversary
attacks the legitimacy of the result of one of the districts, where the green candidate will
win with a high probability. Depending on a policy, votes from that district can be not
included in the final tally. Instead of original tie, the blue candidate win the race.
The adversary can add fake voters. Then auditors should check the list of
voters who actually voted to the list of the registered voters. Any mismatch should raise
a concern about integrity.
Attack on legitimacy. The goal of adversary can be not only adding votes to a
preferred candidate, but also eliminating votes from an opposite party. On the figure 3.6
10 voting districts are pictured. In five districts, a green candidate won. In other five, a
blue candidate won. Knowing the districts where green candidate would win the
elections the adversary votes in one of them. Later, he can claim that he didn't vote and
his name was included in the list of voters by somebody else. If there would be a
relatively high number of such voters, the legitimacy of the result in this particular district
can be a question. Depending on a policy, votes from that district can be excluded from
the final tally. To prevent such an attack we need to have some confirmation that voter
casted his or her ballot. For instance, it can be a stamp printed in the passport at the
time of receiving a ballot. As a result the voter will not be able to vote and pretend later
he didn't. He will be required to present a passport without the stamp. Of course, he can
loose the passport, but one voter can't question the legitimacy of the result. It there29
Upcoming Pages
Here’s what’s next.
Search Inside
This thesis can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Thesis.
Yestekov, Yernat. Design and Analysis of Novel Verifiable Voting Schemes, thesis, December 2013; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc407785/m1/34/: accessed July 17, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .