P205 - 5th International Conference on Electronic Voting 2012 (EVOTE2012)
Autor*innen mit den meisten Dokumenten
Neueste Veröffentlichungen
- KonferenzbeitragAchieving meaningful efficiency in coercion-resistant, verifiable Internet voting(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Spycher, Oliver; Koenig, Reto; Haenni, Rolf; Schläpfer, MichaelIn traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures are put in place to reassure voters that the result of the tally is correct. Considering that in Internet voting errors or fraud will generally scale over a much greater fraction of votes, the demand to get strong reassurances as well, seems more than justified. With the ambition of offering a maximum degree of transparency, so-called verifiable schemes have been proposed. By publishing the relevant information, each voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. Remarkably, this can be done while guaranteeing the secrecy of the ballot at the same time. On the negative side, high transparency will generally make it easier for voters to reveal how they voted, e.g., to a coercer. In this paper we propose an Internet voting protocol that is verifiable and simultateously makes it practically impossible for vote buyers or coercers to elicit the voters' behaviour. We compare its efficiency with existing work under equal degrees of coercion-resistance using an appropriate measure (δ). The contribution of our scheme lies in its efficiency during the most critical phases of the voting procedure, i.e., vote casting and tallying. Moreover, during these phases, efficiency is insensitive to the desired degree of coercion-resistance.
- KonferenzbeitragCoercion-freeness in e-voting via multi-party designated verifier schemes(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Dossogne, Jérôme; Lafitte, Frédéric; Markowitch, OlivierIn this paper we present how multi-party designated verifier signatures can be used as generic solution to provide coercion-freeness in electronic voting schemes. We illustrate the concept of multi-party designated verifier signatures with an enhanced version of Ghodosi and Pieprzyk [GP06]'s threshold signature scheme. The proposed scheme is efficient, secure, allows distributed computations of the signature on the ballot receipt, and can be parameterized to set a threshold on the number of required signers. The security of the designated verifier property is evaluated using the simulation paradigm [Gol00] based on the security analysis of [GHKR08]. Unlike previously provable schemes, ours is ideal, i.e. the bit-length of each secret key share is bounded by the bit-length of the RSA modulus.
- KonferenzbeitragCast-as-intended verification in Norway(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Puigallí Allepuz, Jordi; Guasch Castelló, SandraThe Norwegian Ministry started an initiative to implement Internetvoting trials during the municipal elections in 2011. One of the security requirements of the chosen e-voting system to not to put any trust in the voting client: a malicious application controlling the voting client should not be able to modify the voting options selected by the voter without being detected. This paper describes the voter verification return-code scheme that was implemented for this project. Furthermore, this paper explains the implementation details of the final solution and the workflow of the system during the different election phases. The aim of this paper is to provide a general overview of the cast-as-intended scheme implemented in eValg2011.
- KonferenzbeitragPartial verifiability in POLYAS for the GI elections(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Olembo, M. Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, MelanieWe discuss the use of POLYAS, an Internet voting system, in GI (German Society for Computer Scientists (Gesellschaft für Informatik e.V.)) elections before 2010, in 2010 and 2011, as well as in the future. We briefly describe how the system was extended in 2010 to provide partial verifiability and how the integrity of the GI election result was verified in the 2010 and 2011 elections. Information necessary for partial verifiability has so far only been made available to a small group of researchers. In the future it would be ideal to make such information available to the general public, or to GI members, in order to increase the level of verifiability. We highlight legal considerations accompanying these possibilities, including publishing more details about the election results, the requirement for secret elections, avoiding vote buying, and how to handle complaints. Motivated by legal constraints, we propose further improvements to the POLYAS system. Finally, we generalize our findings for any partially-verifiable Internet voting system.
- KonferenzbeitragInternet voting and individual verifiability: the norwegian return codes(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Barrat, Jordi; Chevalier, Michel; Goldsmith, Ben; Jandura, David; Turner, John; Sharma, RakeshThe Norwegian return codes, used within an Internet voting project piloted in September 2011, intend to simultaneously achieve both receipt-freeness and individual verifiability. They are delivered as text messages with a code representing the value of a voter's cast ballot, but, according to the Norwegian Government, they would not breach the principle of secrecy, and they are not voting receipts, since the voter could always cancel the vote. However, some international electoral standards, like the Recommendations on E-voting from the Council of Europe, clearly forbid an Internet voting system that enables a “voter to be in possession of proof of the content of the vote cast.” This paper analyzes the extent to which the Norwegian system complies with this standard and it concludes that there is no contradiction in using a teleological approach.
- KonferenzbeitragA supervised verifiable voting protocol for the victorian electoral commission(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Burton, Craig; Culane, Chris; Heather, James; Peacock, Thea; Ryan, Peter Y. A.; Schneider, Steve; Srinivasan, Sriramkrishnan; Teague, Vanessa; Wen, Roland; Xia, ZheThis paper describes the design of a supervised, verifiable voting protocol suitable for use for elections in the state of Victoria, Australia. We provide a brief overview of the style and nature of the elections held in Victoria and associated challenges. Our protocol, based on Prêt à Voter, presents a new ballot overprinting front-end design, which assists the voter in completing the potentially complex ballot. We also present and analyze a series of modifications to the backend that will enable it to handle the large number of candidates, 35 +, with ranking single transferable vote (STV), which some Victorian elections require. We conclude with a threat analysis of the scheme and a discussion on the impact of the modifications on the integrity and privacy assumptions of Prêt à Voter.
- KonferenzbeitragRandom block verification: improving the norwegian electoral mix-net(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Demirel, Denise; Jonker, Hugo; Volkamer, MelanieThe VALG project is introducing e-voting to municipal and county elections to Norway. Part of the e-voting system is a mix-net along the lines of Puiggalí et al. - a mix-net which can be efficiently verified by combining the benefits of optimistic mixing and randomized partial checking. This paper investigates their mix-net and proposes a verification method which improves both efficiency and privacy compared to Puiggalí et al.
- Editiertes Buch
- KonferenzbeitragWhen reality comes knocking norwegian experiences with verifiable electronic voting(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Gebhardt Stenerud, Ida Sofie; Bull, ChristianThis paper discusses the Norwegian experiences in piloting a verifiable, remote voting system in a legally binding, public election. First, we provide a highlevel description of the system used. We then go into detail about the major challenges that were encountered in the implementation and execution of the system. In particular, the generation and printing of return codes and the key management are described in detail. We also discuss the relationship between the Norwegian Electoral Management Body and the system integrators, indicating how verifiability may enable new models of cooperation.
- KonferenzbeitragA new implementation of a dual (paper and cryptographic) voting system(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Ben-Nun, Jonathan; Fahri, Niko; Llewellyn, Morgan; Riva, Ben; Rosen, Alon; Ta-Shma, Amnon; Wikström, DouglasWe report on the design and implementation of a new cryptographic voting system, designed to retain the “look and feel” of standard, paper-based voting used in our country Israel while enhancing security with end-to-end verifiability guaranteed by cryptographic voting. Our system is dual ballot and runs two voting processes in parallel: one is electronic while the other is paper-based and similar to the traditional process used in Israel. Consistency between the two processes is enforced by means of a new, specially-tailored paper ballot format. We examined the practicality and usability of our protocol through implementation and field testing in two elections: the first being a student council election with over 2000 voters, the second a political party's election for choosing their leader. We present our findings, some of which were extracted from a survey we conducted during the first election. Overall, voters trusted the system and found it comfortable to use.
- «
- 1 (current)
- 2
- 3
- »