• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Is Your Vote Confidential?

By Lori Cameron

By Lori Cameron on
July 28, 2017

colorful raised handscolorful raised hands

While the controversy still simmers about Russia’s hacking into the recent US presidential election, it was actually the controversial Bush/Gore election of 2000 that led to an upsurge in voting system research.

The goal then was to provide a foolproof computerized verification system that would let voters know their vote was tallied correctly.

Virtually all of the systems had two components: individual verifiability (given to the individual) and universal verifiability (provided to any outside person or entity needing to verify that election results are correct).

So, what’s the problem?

After several decades, confidentiality will be thrown out the window. Anyone can see who you voted for.

That's why Jeroen van de Graaf, author of "Long-Term Threats to Ballot Privacy" in the May/June 2017 issue of IEEE Security & Privacy, has developed a system to protect voter privacy from start to finish. The catch is an encryption method that conceals voter identity but allows for private or public verification of the vote. (Login may be required for full text.)

How? The encryption method uses what’s called "homomorphic tallying" steps to compute and verify results. It's mathematically impossible to change the result without being caught.


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry
Quantum Insider Session Series: The Quantum Imperative
Quantum Insider Session Series: The Quantum Imperative
The Evolution of S&P Magazine
The Evolution of S&P Magazine
How to Stand Out in Today's Competitive Software Engineering Job Market
How to Stand Out in Today's Competitive Software Engineering Job Market
Read Next

Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry

Case Study: Leveraging Large Language Models to Enhance Data Acquisition Software Quality in Oil & Gas Industry

Quantum Insider Session Series: The Quantum Imperative

The Evolution of S&P Magazine

How to Stand Out in Today's Competitive Software Engineering Job Market

In Memoriam: Remembering Mike Flynn

Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale

2026: 80th Anniversary

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter