Vulnerability analysis of three remote voting methods - Computer Science > Computers and SocietyReport as inadecuate




Vulnerability analysis of three remote voting methods - Computer Science > Computers and Society - Download this document for free, or read online. Document in PDF available to download.

Abstract: This article analyses three methods of remote voting in an uncontrolledenvironment: postal voting, internet voting and hybrid voting. It breaks downthe voting process into different stages and compares their vulnerabilitiesconsidering criteria that must be respected in any democratic vote:confidentiality, anonymity, transparency, vote unicity and authenticity.Whether for safety or reliability, each vulnerability is quantified by threeparameters: size, visibility and difficulty to achieve. The study concludesthat the automatisation of treatments combined with the dematerialisation ofthe objects used during an election tends to substitute visible vulnerabilitiesof a lesser magnitude by invisible and widespread vulnerabilities.



Author: Chantal Enguehard LINA, Rémi Lehn LINA

Source: https://arxiv.org/



DOWNLOAD PDF




Related documents