Logo des Repositoriums
 

Recommendations for Implementing IV in Internet Voting

dc.contributor.authorMoser, Florian
dc.contributor.authorGrimm, Rüdiger
dc.contributor.authorHilt, Tobias
dc.contributor.authorKirsten, Michael
dc.contributor.authorNiederbudde, Christoph
dc.contributor.authorVolkamer, Melanie
dc.contributor.editorVolkamer, Melanie
dc.contributor.editorDuenas-Cid, David
dc.contributor.editorRønne, Peter B.
dc.contributor.editorBudurushi, Jurlind
dc.contributor.editorBlom, Michelle
dc.contributor.editorRodriguez Pérez, Adrià
dc.contributor.editorSpycher-Krivonosova, Iuliia
dc.contributor.editorMartin-Rozumilowicz, Beata
dc.contributor.editorSpycher, Oliver
dc.date.accessioned2025-02-14T11:23:57Z
dc.date.available2025-02-14T11:23:57Z
dc.date.issued2024
dc.description.abstractEnd-to-end verifiable systems are employed to safeguard the integrity of Internet voting. Voter-initiated verification for individual verifiability require that the ballot formed on the voter's device is audited on a second device, which is independent of a potentially manipulated voter's device. Further trust is gained by executing the verification procedure on a second device with independent implementations, in order to defend against a dishonest primary system operator. This paper formulates recommendations to implement such independent individual verifiability tools. Our recommendations are based on the experiences made in the GI elections 2023 where such independent tools were made available to the voters -to our knowledge the first project of its kind.en
dc.identifier.doi10.18420/e-vote-id2024_02
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/45861
dc.language.isoen
dc.publisherGesellschaft für Informatik
dc.relation.ispartofE-Vote-ID 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-359
dc.subjectInternet Voting
dc.subjectIndividual Verifiability
dc.subjectSecond Device
dc.titleRecommendations for Implementing IV in Internet Votingen
dc.typeText/Conference Paper
gi.citation.endPage53
gi.citation.publisherPlaceBonn
gi.citation.startPage35
gi.conference.date2.-4. October 2024
gi.conference.locationTarragona, Spain
gi.conference.reviewfull
gi.conference.sessiontitleTrack 1: Security, Usability and Technical Issues

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
B1-2.pdf
Größe:
343.89 KB
Format:
Adobe Portable Document Format