Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1806338.1806446acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Can end-to-end verifiable e-voting be explained easily?

Published: 14 December 2009 Publication History

Abstract

E-Voting is a widely discussed topic---both in the public and in research. In the last couple of years new voting protocols have been proposed. The contribution of this paper is to explain the fundamental concepts of Ben Adida's Scratch & Vote, show an implementation we made and report on the "user" (i.e. voter) experience of a handful of technically knowledgeable voters. All voters were students and they were given an introduction to the concept and could vote which coffee the institute should buy. We explored whether they would be convinced that end-to-end auditable protocols were an improvement to "normal" voting machine typically used in the US.

References

[1]
B. Adida. Advances in cryptographic voting systems. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2006. Adviser-Rivest Ronald, L.
[2]
B. Adida and R. L. Rivest. Scratch & vote: self-contained paper-based cryptographic voting. In WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, pages 29--40, New York, NY, USA, 2006. ACM.
[3]
O. Baudron, P.-A. Fouque, D. Pointcheval, J. Stern, and G. Poupard. Practical multi-candidate election system. In PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, pages 274--283, New York, NY, USA, 2001. ACM.
[4]
T. Buchsbaum. E-voting: International developments and lessons learnt. In Proceedings of Electronic voting in Europe - technology, law, politics and society, workshop of the ESF TED programme together with GI and OCG, pages 31--42, 2004. http://www.e-voting.cc/static/evoting/files/buchsbaum_p31-42.pdf.
[5]
S. Clift. E-democracy, e-governance and public net-work. In B. Lutterbeck and R. A. Gehring, editors, Open Source Jahrbuch 2004 -- Zwischen Softwareentwicklung und Gesellschaftsmodell. Lehmanns Media, Berlin, 2004.
[6]
T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. Information Theory, IEEE Transactions on, 31(4):469--472, Jul 1985.
[7]
W. Essmayr, S. Probst, and E. Weippl. Role-based access controls: Status, dissemination, and prospects for generic security mechanisms. International Journal of Electronic Commerce Research, 4(1):127--156, 2004.
[8]
European Commission. The role of e-government in europe's future. IWAYS, 26(4):168--170, 2003.
[9]
C. Farivar. Clean elections. Commun. ACM, 51(10):16--18, 2008.
[10]
K. Fisher, R. Carback, and A. Sherman. Punchscan: Introduction and system definition of a high-integrity election system. In Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE'06), Cambridge, UK, 2006.
[11]
The Florida Senate. Statutes & Constitution, 2008. http://www.flsenate.gov/statutes/.
[12]
heise.com. Wähler-Selbstkontrolle, May 2007. http://www.heise.de/ct/Wenig-Vertrauen-in-Wahlmaschinen--/artikel/126221.
[13]
K.-I. Ismail, E. Weippl, W. Winiwarter, and S. Wieland. Web engineering for intranets: Rethinking software engineering. In K.-I. Ismail and S. B. W. Schwinger, editors, Proceedings of Proceedings of the 4th International Conference on Information Integration and Web-based Applications & Services (IIWAS), pages 255--260, Indonesia, Sept. 2002. SCS European Publishing House.
[14]
C. Karlof, N. Sastry, and D. Wagner. Cryptographic voting protocols: A systems perspective. In USENIX Security Symposium, pages 33--50, 2005.
[15]
Y. Lindell, A. Lysyanskaya, and T. Rabin. On the composition of authenticated byzantine agreement. J. ACM, 53(6):881--917, 2006.
[16]
MIT Computer Science and Artificial Intelligence Laboratory. Ben Adida, Ronald Rivest, Scratch & Vote, 2006. http://people.csail.mit.edu/rivest/AdidaRivest-ScratchAndVote-slides.pdf.
[17]
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223--238, 1999.
[18]
P. Pallier. Composite-Residuosity Based Cryptography: An Overview. CryptoBytes, 5(1):20--26, 2002.
[19]
R. L. Rivest and W. D. Smith. Three voting protocols: Threeballot, vav, and twin. In EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, pages 16--16, Berkeley, CA, USA, 2007. USENIX Association.
[20]
P. Ryan, S. Schneider, P. Ryan, and S. Schneider. Prêt à voter with re-encryption mixes. In ESORICS. In European Symposium on Research in Computer Security, number 4189 in Lecture Notes in Computer Science, 2006.
[21]
P. Schubert. Einführung in die E-Business-Begriffswelt. Hanser Fachbuch, 2000.
[22]
P. Schubert and U. Häusler. E-government meets e-business: A portal site for startup companies in switzerland. Hawaii International Conference on System Sciences, 5:5005, 2001.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '09: Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
December 2009
763 pages
ISBN:9781605586601
DOI:10.1145/1806338
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Johannes Kepler University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 December 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ACM proceedings
  2. Delphi theory
  3. LATEX
  4. text tagging

Qualifiers

  • Research-article

Conference

iiWAS '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media