{"title":"Survey of the current voter verification algorithms","authors":"M. Javid Moayed, A. A. Abdul Ghani, R. Mahmod","doi":"10.1109/ICCCE.2008.4580639","DOIUrl":null,"url":null,"abstract":"Security in voting system especially in voter verification for satisfaction voter about her votes in cast and counted as intended is one of the most important topics in voting systems. There are ballot of cryptographic election protocols which they encrypt content ballot separate from the voter intended, therefore they canpsilat do ensure that the voting booth records the correct vote. Nowadays, there is a little method that they combined voter intended and ballot encryption together. Every one of these methods has private property and some advantages and disadvantages. For developing in this array, knowing all same methods and comparing them is very helpful. In this article was tried to introduce current same method in voter verification and then compare them.","PeriodicalId":274652,"journal":{"name":"2008 International Conference on Computer and Communication Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Computer and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCE.2008.4580639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security in voting system especially in voter verification for satisfaction voter about her votes in cast and counted as intended is one of the most important topics in voting systems. There are ballot of cryptographic election protocols which they encrypt content ballot separate from the voter intended, therefore they canpsilat do ensure that the voting booth records the correct vote. Nowadays, there is a little method that they combined voter intended and ballot encryption together. Every one of these methods has private property and some advantages and disadvantages. For developing in this array, knowing all same methods and comparing them is very helpful. In this article was tried to introduce current same method in voter verification and then compare them.