Cryptography1 320; https: Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware.
There are different types of electronic voting setup used to cast vote electronically. Direct Recording Electronic Voting Systems Direct-recording electronic voting system was first introduced in the s, it is an electronic implementation of the old mechanical lever systems, where the voters cast ballots by pulling down levers that correspond to each candidate and each lever had a mechanical counter that recorded the number of votes for that position.
It is a computer with a screen to display the ballot and an input device; it processes data with a software and records results in memory components. One advantage of DRE voting machine is that the vote is stored directly into the machines memory and saved for electronic tallying, and the DRE system can later also print a record of ballots cast.
Some of its undesirable features includes not allowing recounting of votes after election in case of a protest like what is obtainable in Nigeria, another issue is that of erroneous software which can greatly affect the result of the election, and the difficulties associated with the collection and processing of very large amount of data obtained from the distributed population which makes e-voting system difficult to understand.
The work discussed cryptographic aspects of constructing e-voting schemes and approached the scheme from three perspectives viz: This work presented important goals for electronic voting schemes such as: Privacy, Robustness, Universal verifiability and freeness.
The Treemap based visualization technique was used to monitor the distributed ballot and voting processes at a mock election in real time.
It was proved that the Treemap algorithms can be configured and transmitted through the central server to effectively monitor the voting transactions in real time and hence enable transparency. According to their work, visualization is the use of computer supported interactive, visual representations of data to amplify cognition.
The purpose of visualization is to gain insight; it is applied to abstract data. The Treemap algorithm invented by Ben Shneiderman in was preferred to other Hierarchical data visualization techniques like the Listing Outlines Technique, because of its ability to provide full structure and content information.
All the structural indentation and modes in area can viewed at a time. The Treemap algorithm involves drawing Treemap and tracking the cursor movement in the Tree. The algorithm can be applied to any tree, regardless of its branching degree, and the algorithm was written using C-language specification.
The E-voting system 2. The networking facilities 3.
The central server or monitoring system In conclusion, they acknowledged that there are some challenges in the adoption of visualization technologies, but that it can easily be circumvented. Complicated cryptographic protocols such as Blind Signatures, homographic schemes were described as the most advanced proposal for securing system.
Research and development institute, designed an e-voting system whose security relies on a tamper resistant Smart Card embedding several cryptographic primitives like list Signatures. They designed an off-line voting system were every voter owns a voting smart card that is used twice.
First in a polling booth and second, in front of a ballot box so as to resemble the traditional vote. A probabilistic encryption scheme was employed and was used by each voter to encrypt his or her ballot which will be decrypted during the counting phase.Many scientific researches have been done in order to achieve security, privacy and correctness in electronic voting systems by improving cryptographic protocols of e-voting systems.
Currently, the cryptographic schemes are not the main problem. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting. Full article (This article belongs to the Special Issue Cryptographic Protocols). Cryptographic Protocols for Electronic Voting After some preliminary research into the subject of electronic voting [BARL], it became apparent that there may be reason to .
Cryptography, an international, peer-reviewed Open Access journal. Switzerland Website | E-Mail Interests: electronic voting; formal protocol analysis; design of cryptographic protocols.
Special Issue Information. Dear Colleagues, Cryptographic protocols, originating from the goal to guarantee confidentiality, authentication, and . Cryptographic Protocols for Electronic Voting Essay. Protocols for Electronic Voting After some preliminary research into the subject of electronic voting [BARL], it became apparent that there may be reason to mistrust current electronic voting systems.
This free Information Technology essay on Essay: Developing a software package for election purposes is perfect for Information Technology students to use as an example.