Monday, May 13, 2019

Survey on Security in Electronic Voting Systems Essay

Survey on Security in Electronic Voting Systems - Essay ExampleDue to this, the ashes provides uniqueness of votes ensuring that no elector passel vote more than once. The notice that the voter receives after plaster cast a ballot cannot be utilize to prove to any third party that they cast a specific vote with the intention to drive them. The system also allows for the verification of individual votes to assure the voters that their votes have been accurately recorded. This can be achieved by inspecting both sides of the ballot paper and checking to see if the unique random number on the voting receipt is on the bulletin board. It also provides accountability such that third parties can confirm that the voting fulfil was valid. The results are only released after the official numbering is complete to ensure fairness and to discourage malevolent actions by observers. The end to end verification system which allows the detection of spiteful behavior at conglomerate stages of the voting process also reduces chances of invalid votes. The disadvantages of the system The main disadvantages of the system are the security issues composite in electronic voting. Data is susceptible to interruptions and alteration by the installation of viruses in online databases by operators with malicious intentions. There is also unequal access to the internet by voters due to unequal chances of acquiring equipment incumbent for electronic voting. Due to the differences in salaries, some voters may be left out from the voting process. The system can be improved by some(prenominal) methods. The E-voting scheme is only applicable for general elections with several contending candidates which feature the majority and plurality style election styles. The scheme can be improved to design in proportional representation. The system is however vulnerable. Parties that are entrusted to execute the algorithm of scheme may agree the system to work in an abnormal way. The instal lation of a virus onto the databases could also lead to discrepancies in the results of the voting process. The article on a practical secret voting scheme for large scurf elections proposes a secret voting system which involves voters, an administrator and a counter which can be replaced with a public board as the participants of the process. It is applicable for a large scale election where it protects the privacy of the voter and ensures the fairness of the voting process regardless of the actions of the administrator and counter. Every voter has a unique routine signature scheme while the administrator has a blind signature scheme. The counter is only tasked with the cornerstone and publish of a list of ballots. The system has several advantages It solves the fairness and privacy issues portrayed in the front methods of the encryption of files and sending of ballots through secret means of communication. The security of the scheme is ensured by the correct counting of all va lid votes. The process is clear, sound and accountable and promotes fairness to discourage dishonesty in voters that would pertain the process. The votes are kept private. The voters have to provide their credentials which ensures that every voter is qualified and to prevent the casting

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.