ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS

被引:0
|
作者
Popoveniuc, Stefan [1 ]
Kelsey, John [2 ]
Leontie, Eugen [3 ]
机构
[1] KT Consulting, Gaithersburg, MD 20878 USA
[2] NIST, Gaithersburg, MD USA
[3] George Washington Univ, Washington, DC USA
关键词
Voting; Privacy; Blind signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic poll books can rapidly check the eligibility of a voter due to their ability to quickly search lists. However, they also introduce a factor of concern: if the electronic poll book records the order of sign-ins and the voting machine or optical scanner records the order in which the voters cast their ballots, ballot secrecy can be compromised. Worse, if the time at which each voter signs-in and the time at which each ballot is cast are recorded, ballot secrecy is lost. It is surprisingly difficult to avoid saving such timing information, for example in event logs, and even more difficult to verify that no such information is saved. In addition, due to operational complexities, even the more efficient electronic poll books can act as a bottleneck in the voting process. We propose a simple technique to address these concerns, by allowing voters to sign-in from home, and print out a bar-coded ticket to be presented at the check-in table. Using blind signatures, this ticket need not reveal information on the voter's identity to the check-in table at the precinct. The ticket proves than the voter is authorized to vote on a particular ballot style without disclosing her identity.
引用
收藏
页码:281 / 286
页数:6
相关论文
共 50 条
  • [1] Do Electronic Poll Books Increase Voter Wait Times?
    Hostetter, Joshua D.
    [J]. ELECTION LAW JOURNAL, 2022, 21 (04): : 296 - 307
  • [2] The global information society and electronic commerce:: Privacy threats and privacy technologies
    Schier, K
    Fischer-Hübner, S
    [J]. COMPUTERS AND NETWORKS IN THE AGE OF GLOBALIZATION, 2000, 57 : 115 - 134
  • [3] Threats to privacy
    Nesson, C
    [J]. SOCIAL RESEARCH, 2001, 68 (01): : 105 - 113
  • [4] ELECTRONIC POLL A WINNER
    MARTINO, JP
    [J]. INDUSTRIAL RESEARCH & DEVELOPMENT, 1983, 25 (04): : 187 - 187
  • [5] Threats to privacy protection
    Barash, Carol Isaacson
    [J]. SCIENCE, 2007, 318 (5852) : 913 - 914
  • [6] 1983 BOOKS FOR YOUNG-ADULTS POLL
    BELDEN, EA
    STAHLSCHMIDT, AD
    LASS, DP
    TOLOUI, AJ
    [J]. ENGLISH JOURNAL, 1983, 72 (08): : 66 - 70
  • [7] 1981 BOOKS FOR YOUNG-ADULTS POLL
    CARLSEN, GR
    BELDEN, EA
    SHERRILL, A
    HOXENG, M
    [J]. ENGLISH JOURNAL, 1982, 71 (01): : 79 - 83
  • [8] 1982 BOOKS FOR YOUNG-ADULTS POLL
    CARLSEN, GR
    LASS, DP
    BELDEN, EA
    [J]. ENGLISH JOURNAL, 1983, 72 (01): : 76 - 80
  • [9] Privacy threats in intimate relationships
    Levy, Karen
    Schneier, Bruce
    [J]. Journal of Cybersecurity, 2021, 6 (01): : 1 - 13
  • [10] Privacy threats in intimate relationships
    Levy, Karen
    Schneier, Bruce
    [J]. JOURNAL OF CYBERSECURITY, 2020, 6 (01):