Logo des Repositoriums
 

Tracking Code-based Verification - Design and Evaluation

dc.contributor.authorNissen, Christina
dc.contributor.authorKulyk, Oksana
dc.contributor.authorVolkamer, Melanie
dc.contributor.authorFredrich, Lara Elisabeth
dc.contributor.authorHermansen, Helena
dc.contributor.editorVolkamer, Melanie
dc.contributor.editorDuenas-Cid, David
dc.contributor.editorRønne, Peter B.
dc.contributor.editorBudurushi, Jurlind
dc.contributor.editorBlom, Michelle
dc.contributor.editorRodriguez Pérez, Adrià
dc.contributor.editorSpycher-Krivonosova, Iuliia
dc.contributor.editorMartin-Rozumilowicz, Beata
dc.contributor.editorSpycher, Oliver
dc.date.accessioned2025-02-14T11:23:57Z
dc.date.available2025-02-14T11:23:57Z
dc.date.issued2024
dc.description.abstractTo mitigate security risks of Internet voting, techniques for verifiability have been developed, allowing the voters to verify that their cast vote has not been manipulated. One such technique is the use of tracking codes, which does not rely on complex cryptographic mechanisms, and therefore is often assumed to be more intuitive for the voters. However, no systematic evaluation of the usability, verification efficacy, and perceived trustworthiness of these systems has yet been conducted. Our contribution evaluates two variants of a tracking code-based system in a user study (N=306), testing both of the variants in the absence of vote manipulations as well as using different simulated tactics of vote manipulation. We conclude that both of our proposed variants are perceived as easy to use, transparent, and trustworthy in the absence of vote manipulation. However, we found varying rates of verification efficacy based on the vote manipulation tactic, manipulation with detection rates ranging from 0% to 76%. We conclude that using tracking codes can be a viable approach. At the same time, more awareness of potential manipulations needs to be raised to achieve the required security level, irrespective of the verification technique in place.en
dc.identifier.doi10.18420/e-vote-id2024_06
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/45865
dc.language.isoen
dc.publisherGesellschaft für Informatik
dc.relation.ispartofE-Vote-ID 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-359
dc.subjecttracking code-based verification
dc.subjectusability
dc.subjectmanipulation detection
dc.subjectend-to-end verifiability
dc.subjectuser study
dc.titleTracking Code-based Verification - Design and Evaluationen
dc.typeText/Conference Paper
gi.citation.endPage100
gi.citation.publisherPlaceBonn
gi.citation.startPage85
gi.conference.date2.-4. October 2024
gi.conference.locationTarragona, Spain
gi.conference.reviewfull
gi.conference.sessiontitleTrack 1: Security, Usability and Technical Issues

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
B1-6.pdf
Größe:
1.72 MB
Format:
Adobe Portable Document Format