Auflistung nach Autor:in "Neumann, Stephan"
1 - 6 von 6
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragCoercion-Resistant Internet Voting in Practice(Informatik 2014, 2014) Feier, Christian; Neumann, Stephan; Volkamer, MelanieInternet voting continues to raise interest both among research and society. Throughout the last decades, many Internet voting schemes have been developed, each one providing particular properties such as receipt-freeness or end-to-end verifiability. One attractive scheme is the JCJ / Civitas scheme due to its property of making coercion attacks ineffective. Neumann and Volkamer [NV12] analyzed the scheme and identified significant usability issues. To overcome these drawbacks, the authors extended the original work by integrating smart cards. In a follow-up work, Neumann et al. [NFVK13] conducted a theoretical performance analysis for this extension and improved the extension towards its applicability in real-world elections. Their analysis left several real-world considerations open for future work. The present work addresses these gaps: We present a prototype implementation of the revised extension and assess its real-world performance. Based on this contribution, we are able to conclude that the revised extension is feasible to be used in real-world elections.
- KonferenzbeitragEntwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail(Informatik 2014, 2014) Budurushi, Jurlind; Neumann, Stephan; Shala, Genc; Volkamer, MelanieMit dem Urteil vom 3. März 2009 hat das Bundesverfassungsgericht die bislang in der Bundesrepublik Deutschland eingesetzten Wahlgeräte für verfassungswidrig erklärt. Grund für dieses Urteil war die fehlende Umsetzung des Prinzips der Öffentlichkeit der Wahl. Mit dem Urteil erklärte das Gericht jedoch nicht grundsätzlich den Einsatz elektronischer Wahlgeräte für verfassungswidrig. Im Rahmen des von der DFG geförderten Projekts 'VerKonWa' wurde das EasyVote System entwickelt, welches den Öffentlichkeitsgrundsatz durch sogenante Paper Audit Trails umsetzt. Im Rahmen dieser Arbeit berichten wir über die Erfahrung bei der Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trails.
- KonferenzbeitragPartial verifiability in POLYAS for the GI elections(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Olembo, M. Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, MelanieWe discuss the use of POLYAS, an Internet voting system, in GI (German Society for Computer Scientists (Gesellschaft für Informatik e.V.)) elections before 2010, in 2010 and 2011, as well as in the future. We briefly describe how the system was extended in 2010 to provide partial verifiability and how the integrity of the GI election result was verified in the 2010 and 2011 elections. Information necessary for partial verifiability has so far only been made available to a small group of researchers. In the future it would be ideal to make such information available to the general public, or to GI members, in order to increase the level of verifiability. We highlight legal considerations accompanying these possibilities, including publishing more details about the election results, the requirement for secret elections, avoiding vote buying, and how to handle complaints. Motivated by legal constraints, we propose further improvements to the POLYAS system. Finally, we generalize our findings for any partially-verifiable Internet voting system.
- TextdokumentRecent Developments in the Context of Online Elections and Digital Polls in Germany(GI SICHERHEIT 2022, 2022) Beckert, Bernhard; Budurushi, Jurlind; Grunwald, Armin; Krimmer, Robert; Kulyk, Oksana; Küsters, Ralf; Mayer, Andreas; Müller-Quade, Jörn; Neumann, Stephan; Volkamer, MelanieThe paper summarizes the technical report [Be21] which was published in 2021. The aim of the paper is to summarize and critically discuss the situation in Germany concerning electronic voting.
- KonferenzbeitragSmart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Budurushi, Jurlind; Neumann, Stephan; Volkamer, MelanieRecently, the interest in electronic voting has increased as more and more states have started to implement such systems. At the same time, classical national ID cards are often being replaced by national electronic ID cards which enable citizens to securely identify and authenticate themselves over the Internet. Despite their popularity, the possibility of using eID cards for e-voting has not been adequately studied. This work surveys e-voting systems in which smart cards were used or were proposed to be used to support the voting process. We consider all types of smart cards, including those only for use in e-voting as well as existing and future national eID cards. In a two-step process, we will analyze the most interesting, real-world applications and proposals from a security, usability, and cost perspective, allowing us to derive our lessons learned. Upon these lessons, we show that the restricted-ID mechanism as implemented in the German eID card serves as an interesting basis for the integration of eID cards in e-voting. We outline that the risk of a “forced-abstention” attack can be mitigated by using the restricted-ID.
- KonferenzbeitragTowards A practical JCJ / civitas implementation(INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt, 2013) Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, RetoInternet voting continues to enjoy wide interest from both research and practice. Among the Internet voting schemes developed over the last decades, JCJ / Civitas stands out from the masses due to its innovative approach to resist voter coercion. To achieve its ambitious goal, the scheme builds upon particularly restrictive assumptions and an abstract credential handling rendering the scheme impractical for real-world use. At ARES 2012, Neumann and Volkamer presented a proposal which implements several of these assumptions (voter-side assumptions) and the credential handling by the use of smart cards. While addressing these practical shortcomings of JCJ / Civitas, their proposal did not take performance into account, and accordingly its performance has not been evaluated. In the present work, we revise the ARES proposal from a performance perspective in a security-invariant manner. Based on the herein proposed revisions, we are able to conclude that the revised ARES proposal is feasible to be used in real-world elections.