
doi: 10.2139/ssrn.3512100
Electronic voting systems is a promising new area, however they pose a significant doubts in their integrity and ability to keep voting confidential. Moreover, security and confidentiality is often considered as a trade-off. In this whitepaper a new system design is proposed that allows both ensuring the voting integrity cannot be compromised and the voter's identity is not revealed when processing ballots. The system is subdivided into the authorization and the ballot processing servers and uses the public-key cryptography. The key idea is to cipher the ballot in a way that the ballot server can get access to the vote, but not to the voter's identity, and the authorization server can check the voter's identity but is unable to decipher the ballot. Tips to ensure software integrity while the voting is running are suggested. Two possible extensions are discussed to account for different voting rights and to include audit trails.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
