P205 - 5th International Conference on Electronic Voting 2012 (EVOTE2012)
Auflistung P205 - 5th International Conference on Electronic Voting 2012 (EVOTE2012) nach Titel
1 - 10 von 23
Treffer pro Seite
Sortieroptionen
- Editiertes Buch
- KonferenzbeitragA supervised verifiable voting protocol for the victorian electoral commission(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Burton, Craig; Culane, Chris; Heather, James; Peacock, Thea; Ryan, Peter Y. A.; Schneider, Steve; Srinivasan, Sriramkrishnan; Teague, Vanessa; Wen, Roland; Xia, ZheThis paper describes the design of a supervised, verifiable voting protocol suitable for use for elections in the state of Victoria, Australia. We provide a brief overview of the style and nature of the elections held in Victoria and associated challenges. Our protocol, based on Prêt à Voter, presents a new ballot overprinting front-end design, which assists the voter in completing the potentially complex ballot. We also present and analyze a series of modifications to the backend that will enable it to handle the large number of candidates, 35 +, with ranking single transferable vote (STV), which some Victorian elections require. We conclude with a threat analysis of the scheme and a discussion on the impact of the modifications on the integrity and privacy assumptions of Prêt à Voter.
- KonferenzbeitragAchieving meaningful efficiency in coercion-resistant, verifiable Internet voting(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Spycher, Oliver; Koenig, Reto; Haenni, Rolf; Schläpfer, MichaelIn traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures are put in place to reassure voters that the result of the tally is correct. Considering that in Internet voting errors or fraud will generally scale over a much greater fraction of votes, the demand to get strong reassurances as well, seems more than justified. With the ambition of offering a maximum degree of transparency, so-called verifiable schemes have been proposed. By publishing the relevant information, each voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. Remarkably, this can be done while guaranteeing the secrecy of the ballot at the same time. On the negative side, high transparency will generally make it easier for voters to reveal how they voted, e.g., to a coercer. In this paper we propose an Internet voting protocol that is verifiable and simultateously makes it practically impossible for vote buyers or coercers to elicit the voters' behaviour. We compare its efficiency with existing work under equal degrees of coercion-resistance using an appropriate measure (δ). The contribution of our scheme lies in its efficiency during the most critical phases of the voting procedure, i.e., vote casting and tallying. Moreover, during these phases, efficiency is insensitive to the desired degree of coercion-resistance.
- KonferenzbeitragCast-as-intended verification in Norway(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Puigallí Allepuz, Jordi; Guasch Castelló, SandraThe Norwegian Ministry started an initiative to implement Internetvoting trials during the municipal elections in 2011. One of the security requirements of the chosen e-voting system to not to put any trust in the voting client: a malicious application controlling the voting client should not be able to modify the voting options selected by the voter without being detected. This paper describes the voter verification return-code scheme that was implemented for this project. Furthermore, this paper explains the implementation details of the final solution and the workflow of the system during the different election phases. The aim of this paper is to provide a general overview of the cast-as-intended scheme implemented in eValg2011.
- KonferenzbeitragCoercion-freeness in e-voting via multi-party designated verifier schemes(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Dossogne, Jérôme; Lafitte, Frédéric; Markowitch, OlivierIn this paper we present how multi-party designated verifier signatures can be used as generic solution to provide coercion-freeness in electronic voting schemes. We illustrate the concept of multi-party designated verifier signatures with an enhanced version of Ghodosi and Pieprzyk [GP06]'s threshold signature scheme. The proposed scheme is efficient, secure, allows distributed computations of the signature on the ballot receipt, and can be parameterized to set a threshold on the number of required signers. The security of the designated verifier property is evaluated using the simulation paradigm [Gol00] based on the security analysis of [GHKR08]. Unlike previously provable schemes, ours is ideal, i.e. the bit-length of each secret key share is bounded by the bit-length of the RSA modulus.
- KonferenzbeitragE-voting at expatriates' MPs elections in France(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Pinault, Tiphaine; Courtade, Pascal
- KonferenzbeitragE-voting for swiss abroad: a joint project between the confederation and the cantons(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Driza-Maurer, Ardita; Spycher, Oliver; Taglioni, Geo; Weber, AninaThe ever-increasing number of expatriates has fed the political debate on the voting rights of Swiss abroad over the last two decades. More than the right to vote itself, the effective exercise of voting rights has become a much-discussed issue. Swiss expatriates are able to vote at the federal level, which means they are invited to vote in popular votes and referendums up to four times a year and in elections every four years. They vote mainly by post and are faced with delays inherent to this method of voting and are sometimes disenfranchised as a result. Internet voting considerably accelerates the return of the ballot. Its introduction has been one of the main demands of Swiss living abroad. In parallel, the federal and cantonal authorities have planned to gradually and pragmatically adapt direct democracy instruments and voting methods to the digital environment in a prudent and long-term process. Internet voting was launched at the beginning of the 21st century and is one of the key projects of the Confederation's e-government strategy. Three Internet voting systems have been developed so far by the cantons of Zurich, Neuchâtel, and Geneva. Internet voting was first offered to Swiss expats in June 2008. For the latest federal elections on February 13, 2011, some 55,000 Swiss abroad had the possibility to vote via Internet; on the federal elections on October 23, 2011, some 22,000 Swiss abroad registered in four cantons took part in the very first Internet voting trial during a federal election. Half of Swiss cantons have now introduced Internet voting, mainly for citizens abroad. While it is too early to draw conclusions on whether Internet voting fosters participation of expatriates in Swiss political life, recent experience clearly shows that Internet voting is well accepted. The success of the Swiss model of the introduction of e- voting can be explained with the following elements: joint strategic planning (the roadmap), a good inter-cantonal cooperation with hosting solutions, and a gradual expansion, which puts security at the center of efforts.
- KonferenzbeitragElectronic voting and null votes: an ongoing debate(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Viayana, Marc TeixidorThe debate over the implementation of e-voting systems still needs to respond to the question of the presence of null votes. Null votes, whose invalidity is due to a contravention of electoral norms, have become a new way through which the electors show their political discontent. The political dimension of null votes requires that e-voting systems ensure and guarantee the presence of null votes as an electoral option. Finally, it is necessary to broach the oft disputed topic of null votes attributed to technology, that is to say, the loss of valid votes due to technical malfunctions of the e-voting system and how to legally address this issue. Estonia, Australia and Norway provide useful examples when looking at technical null votes.
- KonferenzbeitragA fair and robust voting system by broadcast(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Khader, Dalia; Smyth, Ben; Ryan, Peter Y. A.; Hao, FengHao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some voters abort then the election result cannot be announced, that is, the protocol is not robust. Secondly, the last voter can learn the election result before voting, that is, the protocol is not fair. Both drawbacks are typical of other decentralized e-voting protocols. This paper proposes a recovery round to enable the election result to be announced if voters abort, and we add a commitment round to ensure fairness. In addition, we provide a computational security proof of ballot secrecy.
- KonferenzbeitragThe implementation of e-voting in Latin America: the experience of salta, Argentina from a practitioner's perspective(5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012) Mirau, Guillermo Lopez; Ovejero, Teresa; Pomares, JuliaThe most important implementation of e-voting in Argentina so far took place in the province of Salta, in the north of the country on the border with Bolivia. With an electoral roll of 850,000 voters that is ethnically diverse and a complex electoral geography due to a high percentage of mountainous area, its implementation is very valuable for a comparative analysis. The gradual implementation allowed for a systematic assessment, conducted by a large survey of voters and poll workers, who had used both voting methods (the traditional one and the new voting system). This paper presents this case study, emphasizing the goals pursued by this reform as well as some findings from this large undertaking. It concludes by documenting the lessons learned and examining the challenges ahead.
- «
- 1 (current)
- 2
- 3
- »