Design and Analysis of Novel Verifiable Voting Schemes Metadata
Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.
Title
- Main Title Design and Analysis of Novel Verifiable Voting Schemes
Creator
-
Author: Yestekov, YernatCreator Type: Personal
Contributor
-
Chair: Gomathisankaran, MahadevanContributor Type: PersonalContributor Info: Major Professor
-
Committee Member: Buckles, BillContributor Type: Personal
-
Committee Member: Mikler, ArminContributor Type: Personal
-
Committee Member: Mohanty, SarajuContributor Type: Personal
Publisher
-
Name: University of North TexasPlace of Publication: Denton, TexasAdditional Info: www.unt.edu
Date
- Creation: 2013-12
Language
- English
Description
- Content Description: Free and fair elections are the basis for democracy, but conducting elections is not an easy task. Different groups of people are trying to influence the outcome of the election in their favor using the range of methods, from campaigning for a particular candidate to well-financed lobbying. Often the stakes are too high, and the methods are illegal. Two main properties of any voting scheme are the privacy of a voter’s choice and the integrity of the tally. Unfortunately, they are mutually exclusive. Integrity requires making elections transparent and auditable, but at the same time, we must preserve a voter’s privacy. It is always a trade-off between these two requirements. Current voting schemes favor privacy over auditability, and thus, they are vulnerable to voting fraud. I propose two novel voting systems that can achieve both privacy and verifiability. The first protocol is based on cryptographical primitives to ensure the integrity of the final tally and privacy of the voter. The second protocol is a simple paper-based voting scheme that achieves almost the same level of security without usage of cryptography.
Subject
- Keyword: Cyrptography
- Keyword: voting
- Keyword: evoting
- Keyword: electronic voting
- Keyword: verifiable voting
- Keyword: end-to-end verifiability
Collection
-
Name: UNT Theses and DissertationsCode: UNTETD
Institution
-
Name: UNT LibrariesCode: UNT
Rights
- Rights Access: public
- Rights Holder: Yestekov, Yernat
- Rights License: copyright
- Rights Statement: Copyright is held by the author, unless otherwise noted. All rights Reserved.
Resource Type
- Thesis or Dissertation
Format
- Text
Identifier
- Archival Resource Key: ark:/67531/metadc407785
Degree
- Academic Department: Department of Computer Science and Engineering
- Degree Discipline: Computer Science
- Degree Level: Master's
- Degree Name: Master of Science
- Degree Grantor: University of North Texas
- Degree Publication Type: thesi