IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed

Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed
View Sample PDF
Author(s): Roberto Caldelli (University of Florence, Italy), Rudy Becarelli (University of Florence, Italy), Francesco Filippini (University of Florence, Italy), Francesco Picchioni (University of Florence, Italy)and Riccardo Giorgetti (University of Florence, Italy)
Copyright: 2014
Pages: 11
Source title: Assistive Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-4422-9.ch045

Purchase


Abstract

In this paper a Digital Terrestrial Television (DTT) based voting system is presented. This electronic voting technology allows disabled users to cast their vote from home by using common well-known devices. The needed equipment are a TV set, a Set Top Box (STB) with its remote control and a telephone line. The complete infrastructure consists of an MHP (Multimedia Home Platform) application that acts as a client application, a server application that acts as a network/counting server for e-voting, and a security protocol based on asymmetric key encryption to ensure authentication and secrecy of the vote. The MHP application is broadcasted by a certified (e.g., national) TV channel that grants its originality. The user needs a smart card issued by a national authority and to sign the encrypted ballot. The voter can browse the application by acting on the STB remote control. The server application is in charge to verify user identity, to gather and store user's encrypted ballots and finally to count votes. The communication between the client application and the server takes place by means of a secured channel (using HTTPS) while the voting operations are secured with the help of asymmetric keys encryption.

Related Content

Timothy Gifford. © 2023. 23 pages.
Sandy White Watson. © 2023. 18 pages.
Elaine Wilson, Sarah Chesney. © 2023. 32 pages.
Michael Finetti, Nicole Luongo. © 2023. 30 pages.
Anurag Vijay Agrawal, R. Pitchai, C. Senthamaraikannan, N. Alangudi Balaji, S. Sajithra, Sampath Boopathi. © 2023. 23 pages.
Keri A. Sullivan. © 2023. 13 pages.
Nicole L. Lambright. © 2023. 16 pages.
Body Bottom