Method of combating illegal influence on voters in the Internet voting system
DOI:
https://doi.org/10.18372/2225-5036.23.11547Keywords:
Internet voting, information security, the voting method, the neutralization of illegal influence on votersAbstract
A system of Internet voting with fully open to inspection and testing software. The act of voting in this system can be carried out using any device with Internet access. This can be any type of computer, tablet, smartphone, or TV with SmartTV function without using any additional software or hardware. In order to ensure the confidence of the voters the opportunity to monitor the performance of the system in real time to any interested party. As a potential security violators of the voting process are considered by all participants in the electoral process, including personnel, which is responsible for certain functions or areas of the voting system. This ensures the safety of the votes from the disclosure, and the accuracy of the counting of votes - against abuse. It proposed a method of voting in this system, which provides for the possibility of free will of voters subject to the availability of illegal influence factors such as bribery, intimidation or military pressure. Application of the proposed method eliminates the possibility of obtaining information about the result of the vote of any particular voter, because of what becomes meaningless use of illegal influence on voters.
References
E-hääletamise tarkvara [Electronic resource] – Available at: https://github.com/vvk-ehk/evalimine.
Lessons from the EVOTE 2014 Internation Conferens [Electronic resource] – Available at: http://e-lected.blogspot.com/search?updated-min=2014-01-01 T0 0:00:00-08:00&updated-max=2015-01-01T00:00:00-08:00& max-results=50.
Schneier B. What's Wrong With Electronic Voting Machines? [Electronic resource] – Available at: https://www.schneier.com/essays/archives/2004/11/whats_wrong_with_ele.html.
Shannon C.E. The Communication Theory of Secrecy Systems / C.E. Shannon // Bell System Technical Journal. – 1949 – v.28, n.4 – P.654-715.
Вишняков В.М. Відкрита система таємного голосування / В.М. Вишняков, М.П. Пригара, О.В. Воронін // Управління розвитком складних систем. Збірник наукових праць. – 2014. – Вип. 20. – С. 110-115.
НД ТЗІ 2.5-010-03 Вимоги до захисту інформації WEB-сторінки від несанкціонованого доступу – Чинний від 15.04.2003. – К.: ДСТСЗІ СБ України, 2003.
Чуприн В.М. Генерування випадкових чисел штатними засобами хостів мережі Інтернет./ В.М. Чуприн, В.М.Вишняков, М.П. Пригара // За-хист інформації. – 2016. – Т. 18, №4 – С. 323-335.
Jens Zumbrägel. «Discrete Logarithms in GF(2^9234)», 31 January 2014, [Електронний ресурс] – Режим доступу: https://listserv.nodak.edu/cgi-bin/wa .exe?A2=NMBRTHRY;9aa2b043.1401.
Antoine J. «Discrete logarithms in GF(26168) [=GF((2257)24)]», May 21, 2013. [Electronic resource] – Available at: https://listserv.nodak.edu/cgi-bin/waex e ?A2=ind1305&L=NMBRTHRY&F=&S=&P=3034.
Essex A., Clark J., Hengartner U. Cobra: Toward Concurrent Ballot Authorization for Internet Voting. Electronic Voting Technology Workshop/ Work shop on Trustworthy Elections (EVT/WOTE’12). Bellevue (USA), 2012, pp. 1-13.