P205 - 5th International Conference on Electronic Voting 2012 (EVOTE2012)
Auflistung P205 - 5th International Conference on Electronic Voting 2012 (EVOTE2012) nach Erscheinungsdatum
1 - 10 von 23
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragAchieving meaningful efficiency in coercion-resistant, verifiable Internet voting(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Spycher, Oliver; Koenig, Reto; Haenni, Rolf; Schläpfer, MichaelIn traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures are put in place to reassure voters that the result of the tally is correct. Considering that in Internet voting errors or fraud will generally scale over a much greater fraction of votes, the demand to get strong reassurances as well, seems more than justified. With the ambition of offering a maximum degree of transparency, so-called verifiable schemes have been proposed. By publishing the relevant information, each voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. Remarkably, this can be done while guaranteeing the secrecy of the ballot at the same time. On the negative side, high transparency will generally make it easier for voters to reveal how they voted, e.g., to a coercer. In this paper we propose an Internet voting protocol that is verifiable and simultateously makes it practically impossible for vote buyers or coercers to elicit the voters' behaviour. We compare its efficiency with existing work under equal degrees of coercion-resistance using an appropriate measure (δ). The contribution of our scheme lies in its efficiency during the most critical phases of the voting procedure, i.e., vote casting and tallying. Moreover, during these phases, efficiency is insensitive to the desired degree of coercion-resistance.
- KonferenzbeitragInternet voting system security auditing from system development through implementation:Best practices from electronic voting deployments(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Aceto, L. Jay; Shafer, Michelle M.; Smith Ill, Edwin B.; Walker, Cyrus J.There are many security challenges associated with the use of Internet voting solutions. While we are not advocating for the use of Internet voting in this paper, we do assert that if an Internet voting solution is going to be used, its deployment must be undertaken with continuous security auditing in place – security auditing that begins with the development of the Internet voting system by the manufacturer or election jurisdiction and continues throughout the system's use in the field.
- KonferenzbeitragCoercion-freeness in e-voting via multi-party designated verifier schemes(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Dossogne, Jérôme; Lafitte, Frédéric; Markowitch, OlivierIn this paper we present how multi-party designated verifier signatures can be used as generic solution to provide coercion-freeness in electronic voting schemes. We illustrate the concept of multi-party designated verifier signatures with an enhanced version of Ghodosi and Pieprzyk [GP06]'s threshold signature scheme. The proposed scheme is efficient, secure, allows distributed computations of the signature on the ballot receipt, and can be parameterized to set a threshold on the number of required signers. The security of the designated verifier property is evaluated using the simulation paradigm [Gol00] based on the security analysis of [GHKR08]. Unlike previously provable schemes, ours is ideal, i.e. the bit-length of each secret key share is bounded by the bit-length of the RSA modulus.
- Editiertes Buch
- KonferenzbeitragE-voting at expatriates' MPs elections in France(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Pinault, Tiphaine; Courtade, Pascal
- KonferenzbeitragThe new belgian e-voting system(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Vegas Gonzáles, CarlosIn use since 1994, the Belgian e-voting system has reached the end of its useful life. A new prototype (an improved paper-based voting system), developed by a consortium led by Smartmatic, will be used for the first time in October 2012. This paper takes a look at the workings of the new system and carries out a brief analysis of its compatibility with the main international election standards.
- KonferenzbeitragMapping the literature: socio-cultural, organizational and technological dimensions of e-voting technologies(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Boulus-Rødje, NinaAs the utilization of various e-voting technologies has notably increased in the past few years, so has the amount of publications on experiences with these technologies. This article will, therefore, map the literature while highlighting some of the important topics discussed within the field of e-voting. Particular attention will be paid to the non-technical dimensions of implementation, including the socio-cultural, organizational, and political dimensions.
- KonferenzbeitragTesting democracy: how independent testing of e-voting systems safeguards electoral integrity(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Phillips, Mark D.; Soudriette, Richard W.When properly implemented, electronic election systems provide accurate vote counting, timely transmission of results, and secure electoral processes. Independent testing and certification by qualified testing laboratories offer election administrators, election stakeholders, and the public assurance that e-voting systems are trustworthy. Testing is an essential tool to safeguard the integrity of e-voting systems.
- KonferenzbeitragCast-as-intended verification in Norway(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Puigallí Allepuz, Jordi; Guasch Castelló, SandraThe Norwegian Ministry started an initiative to implement Internetvoting trials during the municipal elections in 2011. One of the security requirements of the chosen e-voting system to not to put any trust in the voting client: a malicious application controlling the voting client should not be able to modify the voting options selected by the voter without being detected. This paper describes the voter verification return-code scheme that was implemented for this project. Furthermore, this paper explains the implementation details of the final solution and the workflow of the system during the different election phases. The aim of this paper is to provide a general overview of the cast-as-intended scheme implemented in eValg2011.
- KonferenzbeitragPartial verifiability in POLYAS for the GI elections(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Olembo, M. Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, MelanieWe discuss the use of POLYAS, an Internet voting system, in GI (German Society for Computer Scientists (Gesellschaft für Informatik e.V.)) elections before 2010, in 2010 and 2011, as well as in the future. We briefly describe how the system was extended in 2010 to provide partial verifiability and how the integrity of the GI election result was verified in the 2010 and 2011 elections. Information necessary for partial verifiability has so far only been made available to a small group of researchers. In the future it would be ideal to make such information available to the general public, or to GI members, in order to increase the level of verifiability. We highlight legal considerations accompanying these possibilities, including publishing more details about the election results, the requirement for secret elections, avoiding vote buying, and how to handle complaints. Motivated by legal constraints, we propose further improvements to the POLYAS system. Finally, we generalize our findings for any partially-verifiable Internet voting system.
- «
- 1 (current)
- 2
- 3
- »