Feng Hao and Peter Y A Ryan (Eds.) Real-World Electronic Voting: Design, Analysis and Deployment
|
|
- Joleen Scott
- 5 years ago
- Views:
Transcription
1 Feng Hao and Peter Y A Ryan (Eds.) Real-World Electronic Voting: Design, Analysis and Deployment
2
3 Contents Foreword xvii Preface xxi SECTION I: SETTING THE SCENE 1 1 Software Independence Revisited Ronald L. Rivest and Madars Virza 1.1 Introduction Problem: Software complexity of voting systems The difficulty of evaluating complex software for errors The need for software-independent approaches Definition and rationale for software-independence Refinements and elaborations of software-independence Examples of software-independent approaches How does one test for software-independence? Discussion Implications for testing and certification Related issues Evidence-based elections The use of a public ledger End-to-end verifiable voting systems iii
4 iv 1.9 Program verification Verifiable computation and zero-knowledge proofs Conclusions and suggestions Guidelines for Trialling E-voting in National Elections Ben Goldsmith 2.1 Terminology Context for E-Voting International Electoral Standards Decision in Principle Decision in Principle Foundations Feasibility Study Mandate Vendor Relations Feasibility Study Committee Working Groups Issue 1 Assessment of the Current System of Voting and Counting Issue 2 Assessment of the Advantages and Disadvantages Offered by Voting Technologies Issue 3 Review of IT Security Aspects Issue 4 Determining Technical Feasibility Issue 5 Cost Benefit Analysis Issue 6 Institutional Capacity Issue 7 Legal Reform Issues Study Trips Vendor Demonstration Stakeholder Consultation Decision in Principle Pilot Project Prerequisites Pilot Project Mandate Type of Pilot Pilot Locations Solutions Being Piloted Legislation Electronic Voting Technology Specification
5 v Pilot Project Funding Pilot Project Managing the Pilot Project Procuring Electronic Voting Technologies Testing and Certification Polling and Counting Procedures Voter Education Training Stakeholder Outreach Election Day Support Observation of the Pilot Project Mandatory Audit Pilot Project Evaluation The Decision on Adoption SECTION II: REAL-WORLD E-VOTING IN NATIONAL ELECTIONS 51 3 Overview of Current State of E-voting World-wide Carlos Vegas and Jordi Barrat 3.1 Introduction The Public Nature of Elections Civic Activism Business as Usual Outdated Technologies The Political Context Voters Matter Conclusions Electoral Systems Used around the World Siamak F. Shahandashti 4.1 Introduction Some Solutions to Electing A Single Winner Some Solutions to Electing Multiple Winners
6 vi 4.4 Blending Systems Together Other Solutions Which Systems Are Good? A Theorist s Point of View Majority Rules Bad News Begins Arrow s Impossibility Theorem Gibbard Satterthwaite Impossibility Theorem Systems with Respect to Criteria A Practitioner s Point of View E-voting in Norway Kristian Gjøsteen 5.1 Introduction Elections in Norway Requirements Buying a Voting System Cryptographic Protocol Scytl s Proposal Modifications The Modified Protocol Deployment The 2011 Election The 2013 Election Concluding Remarks E-voting in Estonia Dylan Clarke and Tarvi Martens 6.1 Voting in Estonia Estonian National ID Cards The Internet Voting System System Components Normal System Operation
7 vii Auditing and Verification Capabilities Internet Voting Assumptions and Reception System Performance Practical Attacks on Real-world E-voting J. Alex Halderman 7.1 Introduction Touchscreen DREs Diebold Top to Bottom The Test of Time Around the World Internet Voting The Washington, D.C. Internet Voting System Estonia s Internet Voting System The New South Wales ivote System Conclusion SECTION III:E2E VOTING SYSTEM AND REAL-WORLD APPLICATIONS An Overview of End-to-End Verifiable Voting Systems Syed Taha Ali and Judy Murray 8.1 Introduction Security Properties of Voting Systems Vote Privacy Vote Verifiability Other Properties Conflicts and Challenges Cryptographic E2E Voting Systems Precinct-based Voting with Physical Ballots Votegrity Prêt à Voter Punchscan
8 viii Scantegrity Scratch & Vote Precinct-based Voting with Electronic Ballots MarkPledge Bingo Voting Voter Initiated Auditing VoteBox Wombat STAR-Vote DRE-i Remote Voting with Electronic Ballots Adder JCJ and Civitas Helios Pretty Good Democracy Remotegrity Non-cryptographic E2E Voting Systems ThreeBallot, VAV, and Twin Randell & Ryan s Scratch Card Voting System Aperio The Way Forward for E2E Voting Systems Technical Issues Usability Legal Framework Uptake of E2E Voting Systems Conclusion Acknowledgements Theoretical Attacks on E2E Voting Systems Peter Hyun-Jeen Lee and Siamak F. Shahandashti 9.1 Introduction Integrity Misprinted ballots attack
9 ix Trash Attack Clash Attack Flawed Mix-net Privacy Replay Attack Kleptographic Attack Pfitzmann s attack Duplicate ciphertext attack Breaking privacy without detection Coercion Forged ballot Vote against a candidate Scratch-off card attack Spoiling ballots Pay-Per-Mark & Pay-for-Receipt Conclusion Acknowledgements The Scantegrity Voting System and its Use in the Takoma Park Elections 237 Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora, John Wittrock, and Filip Zagórski 10.1 Introduction Key Properties Outline Organization of this chapter The Punchscan Voting System Voter Experience Election Set-Up Ballot Printing and Voter Privacy The First Binding E2E Election Lessons Learned The Scantegrity II Voting System Ballot Features
10 x The Scantegrity Back-End Election Day Posting and Tallying Auditing the Results Dispute Resolution The 2009 Takoma Park Election Requirements Mock Election The Election The Remotegrity Voting System Voter Experience Security Properties Audiotegrity The Voting Process with Audiotegrity Dispute Resolution Properties Takoma Park Election, Usability Studies Related Studies Methodology Known Limitations Voter Response Observational Results Election Judge Response Study Findings Current Status of the Project Conclusions Internet voting with Helios Olivier Pereira 11.1 Introduction Helios History Election walkthrough Voting in a Helios election
11 xi Invitation to vote Submitting a ballot Election management Election creation Election tally Election audit Cast-as-intended verification Recorded-as-cast verification Tallied-as-recorded verification The use of cryptography in Helios Arithmetic and computational assumption Encryption Zero-Knowledge proofs Sigma protocols Proving honest key generation Proving correct decryption Proving ballot validity Protocol analysis Works on Verifiability Works on ballot privacy Miscellaneous works Web application perspective The browser interface Cryptography in the browser Application security Helios variants and related systems Mixnet-based variants Variants aiming at countering ballot-stuffing Variants aiming at perfectly private audit data Variants based on full threshold encryption Variant supporting vote delegation Alternate Helios frontends Audit tools
12 xii 11.6 Conclusion Prêt à Voter - the Evolution of the Species Peter Y A Ryan, Steve Schneider, and Vanessa Teague 12.1 Introduction End-to-End Verifiability Outline of Prêt à Voter The Voting Ceremony Vote Counting Advantages of Prêt à Voter Auditing the Election Auditing the Ballot Generation Authority Auditing Mixing and Decryption Auditing the Mixes Auditing the Decryption Tellers Cryptographic Components Decryption mixes Re-encryption mixnets Re-encryption mixes with cyclic shifts Re-encryption Mixes with Affine Transformations Re-encryption Mixes With Full Permutations Distributed generation of ballots The bulletin board Facilitating verification and privacy Encouraging cast-as-intended verification (Ballot auditing) Enhancing robustness using parallel verification mechanisms Verified Encrypted Paper Audit Trails Human Readable Paper Audit Trails Confirmation codes and signatures Accountability, dispute resolution and Resilience Cast-as-Intended Verification Authenticity of Receipts (included-as-cast verification) Tally verification
13 xiii 12.8 Vulnerabilities and Counter-measures Ballot Stuffing Information Leakage Retention of the Candidate List Forced/Coerced Randomisation Chain Voting Trash Attacks Clash Attacks Psychological Attacks Prêt à Voter Goes Down-Under Significance of the VEC Election Challenges of combining end-to-end verifiability with traditional Victorian paper voting Specific Design choices Computer-assisted voting Unified Scanner and EBM Handling complex ballots and printing them on demand The Web Bulletin Board vvote-specific vulnerabilities and countermeasures Practical experiences Conclusions DRE-i and Self-Enforcing E-Voting Feng Hao 13.1 Introduction Dining Cryptographers problem Description of the problem Chaum s original solution: DC-net Limitations of DC-net First attempt on a new solution Improved solution: AV-net Presentation at SPW Boardroom electronic voting
14 xiv Open Vote protocol Extension to multi-candidate election Presentation at WISSec Large-scale electronic voting From decentralized to centralized Trade-off Direct Recording Electronic with Integrity Setup Voting Tallying Publication of the DRE-i paper Trial elections Prototyping DRE-i Favourite chocolate election Favourite cheese election ERC Starting Grant on Self-Enforcing E-Voting A Verifiable Classroom Voting system Cryptography Meeting Pedagogy Conclusion STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System Susan Bell, Josh Benaloh, Michael D. Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya, Michelle Parker, Olivier Pereira, Philip B. Stark, Dan S. Wallach, and Michael Winn 14.1 Introduction Voter Flow Design Crypto Overview Triple Assurance Software and Hardware Engineering Usability Design Considerations User Interface Design Specification
15 xv Issues that still need to be addressed Audit The Cryptographic Workflow Threats Coercion Chain voting Absentee and provisional ballots Further analysis Conclusions and Future Work References Index
Security of Voting Systems
Security of Voting Systems Ronald L. Rivest MIT CSAIL Given at: Collège de France March 23, 2011 Outline Voting technology survey What is being used now? Voting Requirements Security Threats Security Strategies
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationJosh Benaloh. Senior Cryptographer Microsoft Research
Josh Benaloh Senior Cryptographer Microsoft Research September 6 2018 Findings and Recommendations The election equipment market and certification process are badly broken. We need better ways to incentivize
More informationvvote: a Verifiable Voting System
vvote: a Verifiable Voting System arxiv:1404.6822v4 [cs.cr] 20 Sep 2015 Technical Report Version 4.0 Chris Culnane, Peter Y A Ryan, Steve Schneider and Vanessa Teague Contents Abstract 4 1. Introduction
More informationThis is a repository copy of Verifiable Classroom Voting in Practice.
This is a repository copy of Verifiable Classroom Voting in Practice. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/117987/ Version: Accepted Version Article: Hao, Feng,
More informationA vvote: a Verifiable Voting System
A vvote: a Verifiable Voting System Chris Culnane, Peter Y.A. Ryan, Steve Schneider and Vanessa Teague 1 1. INTRODUCTION This paper details a design for end-to-end verifiable voting in the Australian state
More informationAn Introduction to Cryptographic Voting Systems
Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationSTAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System Josh Benaloh (Microsoft Research) Mike Byrne (Rice University) Bryce Eakin (independent consultant) Philip Kortum (Rice University)
More informationAccessible Voter-Verifiability
Cryptologia, 33:283 291, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190902894946 Accessible Voter-Verifiability DAVID CHAUM, BEN HOSP, STEFAN POPOVENIUC, AND POORVI
More informationThe Effectiveness of Receipt-Based Attacks on ThreeBallot
The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,
More informationPrêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia
662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,
More informationAuditability and Verifiability of Elec4ons Ronald L. Rivest
Auditability and Verifiability of Elec4ons Ronald L. Rivest MIT ACM- IEEE talk March 16, 2016 Have we made progress since 2000? Hanging chads (2000) >>> Voting Machines at Risk (2015) Nov. 2016 Who Really
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationUsing Prêt à Voter in Victorian State Elections. EVT August 2012
Using Prêt à Voter in Victorian State Elections EVT August 2012 Craig Burton 1 Chris Culnane 2 James Heather 2 Thea Peacock 3 Peter Y. A. Ryan 3 Steve Schneider 2 Sriram Srinivasan 2 Vanessa Teague 4 Roland
More informationRonald L. Rivest MIT CSAIL Warren D. Smith - CRV
G B + + B - Ballot Ballot Box Mixer Receipt ThreeBallot, VAV, and Twin Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV Talk at EVT 07 (Boston) August 6, 2007 Outline End-to-end voting systems ThreeBallot
More informationSTAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System Susan Bell, Office of the Travis County Clerk Josh Benaloh, Microsoft Research Michael D. Byrne, Rice University Dana DeBeauvoir,
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationPunchscan: Introduction and System Definition of a High-Integrity Election System
Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Pret a Voter with a Human-Readable, Paper Audit Trail. P. Y. A. Ryan. TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Pret a Voter with a Human-Readable, Paper Audit Trail P. Y. A. Ryan. TECHNICAL REPORT SERIES No. CS-TR-1038 July, 2007 TECHNICAL
More informationevoting after Nedap and Digital Pen
evoting after Nedap and Digital Pen Why cryptography does not fix the transparency issues Ulrich Wiesner 25C3, Berlin, 29 th December 2008 Agenda Why is evoting an issue? Physical copies, paper trail?
More informationTowards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema
Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Dermot Cochran IT University Technical Report Series TR-2015-189 ISSN 1600-6100 August 2015 Copyright 2015,
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationEvery Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao School of Computing Science Newcastle University, UK feng.hao@ncl.ac.uk Matthew Nicolas Kreeger Thales Information
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationBrittle and Resilient Verifiable Voting Systems
Brittle and Resilient Verifiable Voting Systems Philip B. Stark Department of Statistics University of California, Berkeley Verifiable Voting Schemes Workshop: from Theory to Practice Interdisciplinary
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationTHE FUTURE OF E-VOTING
IADIS International Journal on Computer Science and Information Systems Vol. 12, No. 2, pp. 148-165 ISSN: 1646-3692 THE FUTURE OF E-VOTING Pavel Tarasov and Hitesh Tewari School of Computer Science and
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationColorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett
Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb 2018 -- Neal McBurnett Overview of the Journey Post-Election Audits are Important How Traditional Audits Work Why RLA is better Definitions
More informationThe E-voting Controversy: What are the Risks?
Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April
More informationThoughts On Appropriate Technologies for Voting
Thoughts On Appropriate Technologies for Voting Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Princeton CITP E-voting Workshop 2012-11-01 Is Voting Keeping Up with Technology? We live in
More informationAFFIDAVIT OF POORVI L. VORA. 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George
AFFIDAVIT OF POORVI L. VORA POORVI L. VORA, being duly sworn, deposes and says the following under penalty of perjury: 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George Washington
More informationThe Use of New Voting Technologies (NVT)
osce.org/odihr/elections Elections RK 22.10.2013 The Use of New Voting Technologies (NVT) Comparative Experiences in the Implementation of Electronic Voting Lima, Peru Presumably the voting machine does
More informationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 611 Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes David Chaum,
More informationThe USENIX Journal of Election Technology and Systems. Volume 2, Number 3 July 2014
JETS The USENIX Journal of Election Technology and Systems JETS The USENIX Journal of Election Technology and Systems Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting1 Feng Hao, Newcastle
More informationL9. Electronic Voting
L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationApollo End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Apollo End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation Dawid Gawe l 2, Maciej Kosarzecki 2, Poorvi L. Vora 1, Hua Wu 1, and Filip Zagórski 2 1 Department of Computer Science,
More informationAn Object-Oriented Framework for Digital Voting
An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo
More informationTECHNICAL REPORT SERIES. No. CS-TR-1071 February, Human readable paper verification of Pret a Voter. David Lundin and Peter Y. A. Ryan.
COMPUTING SCIENCE Human readable paper verification of Pret a Voter D. Lundin and P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008 TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008
More informationPrêt à Voter with Confirmation Codes
Prêt à Voter with Confirmation Codes Peter Y A Ryan, Interdisciplinary Centre for Security and Trust and Dept. Computer Science and Communications University of Luxembourg peter.ryan@uni.lu Abstract A
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More information2010 Pre-election Logic and Accuracy & Post-election Audit Grant Program
2010 Pre-election Logic and Accuracy & Post-election Audit Grant Program Grant Recipient Program Summaries California Secretary of State; Sacramento, CA (Audit) Contact: Ms. Jennie Bretschneider Jennie.bretschneider@sos.ca.gov,
More informationarxiv: v3 [cs.cr] 3 Nov 2018
Exploiting re-voting in the Helios election system Maxime Meyer a, Ben Smyth b arxiv:1612.04099v3 [cs.cr] 3 Nov 2018 Abstract a Vade Secure Technology Inc., Montreal, Canada b Interdisciplinary Centre
More informationUsability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System Fatih Karayumak, Maina M. Olembo, Michaela Kauer and Melanie Volkamer CASED Technische Universität Darmstadt {fatih.karayumak,
More informationHuman readable paper verification of Prêt à Voter
Human readable paper verification of Prêt à Voter David Lundin and Peter Y. A. Ryan d.lundin@surrey.ac.uk, University of Surrey, Guildford, UK peter.ryan@ncl.ac.uk, University of Newcastle upon Tyne, UK
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationSummative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use
812586HFSXXX10.1177/0018720818812586Human FactorsUsability of Star-Voteresearch-article2018 Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationElectronic Voting. Mohammed Awad. Ernst L. Leiss
Electronic Voting Mohammed Awad Ernst L. Leiss coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationScantegrity Mock Election at Takoma Park
Scantegrity Mock Election at Takoma Park Alan T. Sherman (UMBC), 1 Richard Carback (UMBC), David Chaum, Jeremy Clark (UWaterloo), Aleksander Essex (UOttawa), Paul S. Herrnson (UMCP), Travis Mayberry (UMBC),
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationFrom Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II
From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II Claudia Z. Acemyan 1, Philip Kortum 1, Michael D. Byrne 1, 2, Dan S. Wallach
More informationPretty Good Democracy for more expressive voting schemes
Pretty Good Democracy for more expressive voting schemes James Heather 1, Peter Y A Ryan 2, and Vanessa Teague 3 1 Department of Computing, University of Surrey, Guildford, Surrey GU2 7XH, UK j.heather@surrey.ac.uk
More informationRemote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationA Verifiable Voting Protocol based on Farnel
A Verifiable Voting Protocol based on Farnel Roberto Araújo 1, Ricardo Felipe Custódio 2, and Jeroen van de Graaf 3 1 TU-Darmstadt, Hochschulstrasse 10, 64289 Darmstadt - Germany rsa@cdc.informatik.tu-darmstadt.de
More informationScantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy Richard Carback UMBC CDL Baltimore, MD 21250 carback1@umbc.edu John Conway UMBC CDL Baltimore,
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationRisk-Limiting Audits
Risk-Limiting Audits Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017 Risk-Limiting Audits (RLAs) Assumptions What do they do? What do they not do? How do RLAs work? Extensions References (Assumption)
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationHOUSE BILL 1060 A BILL ENTITLED. Election Law Delay in Replacement of Voting Systems
HOUSE BILL 0 B, G, L EMERGENCY BILL 0lr0 HB /0 W&M CF SB By: Delegates Eckardt, Cane, Costa, Elliott, Elmore, Haddaway, Jenkins, Krebs, O Donnell, Schuh, Shank, Smigiel, Sossi, and Stocksdale Introduced
More informationOn the Independent Verification of a Punchscan Election
On the Independent Verification of a Punchscan Election Richard T. Carback III Center for Information Security and Assurance, University of Maryland, Balitmore County. carback1@umbc.edu Jeremy Clark School
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationOCSE Vienna 17/ Open Source Remote Electronic Voting in Norway
OCSE Vienna 17/9 2010 Open Source Remote Electronic Voting in Norway Project Manager Henrik Nore The Ministry of Local Government and Regional Development Project scope Why internet voting increase availability
More informationExact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters Anne Broadbent 1, 2 Stacey Jeffery 1, 2 Alain Tapp 3 1. Department of Combinatorics and Optimization, University
More informationMitigating Coercion, Maximizing Confidence in Postal Elections
Mitigating Coercion, Maximizing Confidence in Postal Elections JACOB QUINN SHENKER, California Institute of Technology R. MICHAEL ALVAREZ, California Institute of Technology 1. INTRODUCTION Elections have
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationA Secure Paper-Based Electronic Voting With No Encryption
A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakoly, Reza Ebrahimi Atani Department of Computer Engineering, Faculty of engineering, University of Guilan, P.O. Box 3756, Rasht, Iran.
More informationJohns Hopkins University Security Privacy Applied Research Lab
Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631
More informationVoting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY: SPECIAL ISSUE ON ELECTRONIC VOTING 1 Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan Jeroen van de Graaf Abstract We present
More informationSpeakUp: remote unsupervised voting
SpeakUp: remote unsupervised voting Stefan Popoveniuc KT Consulting stefan@popoveniuc.com Abstract. We present SpeakUp, a novel way to cast a ballot remotely, using a personal computer connected to the
More informationAn Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1 April 15, 2006 Alan T. Sherman*, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru,
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationBetween Law and Technology: Internet Voting, Secret Suffrage and the European Electoral Heritage
Between Law and Technology: Internet Voting, Secret Suffrage and the European Electoral Heritage Adrià Rodríguez-Pérez Scytl Secure Electronic Voting, S.A. adria.rodriguez@scytl.com October 2017 2 3 4
More informationIndividual Verifiability in Electronic Voting
Individual Verifiability in Electronic Voting Sandra Guasch Castelló Universitat Politècnica de Catalunya Supervisor: Paz Morillo Bosch 2 Contents Acknowledgements 7 Preface 9 1 Introduction 11 1.1 Requirements
More informationBlind Signatures in Electronic Voting Systems
Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationApproval Voting. Simple, Effective Voting Method Reform. Neal McBurnett. for the League of Women Voters, Boulder County Revised
Approval Voting Simple, Effective Voting Method Reform Neal McBurnett for the League of Women Voters, Boulder County 2017-02-21 Revised 2017-04-02 Center for Election Science 501(c)(3) founded in 2011
More informationGAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments
GAO United States Government Accountability Office Report to the Chairman, Committee on Rules and Administration, U.S. Senate September 2008 ELECTIONS States, Territories, and the District Are Taking a
More informationL14. Electronic Voting
L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the
More informationPrêt à Voter: a Systems Perspective
Prêt à Voter: a Systems Perspective Peter Y. A. Ryan and Thea Peacock September 20, 2005 Abstract Numerous cryptographic voting schemes have been proposed in recent years. Many of these have highly desirable
More informationInternet Voting: Experiences From Five Elections in Estonia
Internet Voting: Experiences From Five Elections in Estonia Priit Vinkel Estonia Abstract: Estonia has been one of the pioneers of Internet Voting by introducing Internet Voting in binding elections in
More informationThe USENIX Journal of Election Technology and Systems. Volume 3, Number 2 August 2015
JETS The USENIX Journal of Election Technology and Systems JETS The USENIX Journal of Election Technology and Systems From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With
More informationUsability is not Enough: Lessons Learned from Human Factors in Security Research for Verifiability
Usability is not Enough: Lessons Learned from Human Factors in Security Research for Verifiability Oksana Kulyk, Melanie Volkamer Karlsruhe Institute of Technology, Karlsruhe, Germany Abstract. A well-known
More informationA Robust Electronic Voting Scheme Against Side Channel Attack
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 7-86 (06) A Robust Electronic Voting Scheme Against Side Channel Attack YI-NING LIU, WEI GUO HI CHENG HINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi
More informationSplit-Ballot Voting: Everlasting Privacy With Distributed Trust
Split-Ballot Voting: Everlasting Privacy With Distributed Trust TAL MORAN Weizmann Institute of Science, Israel and MONI NAOR Weizmann Institute of Science, Israel In this paper we propose a new voting
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.
More information