Abstract
In remote electronic elections the voting client software is usually in charge of encoding the voting options chosen by the voter. Cast as intended verification methods can be used to audit this process, so that voters do not need to trust the voting client software. In this paper we present the revision of our initial proposal for the eValg2011 project for an Internet voting protocol providing cast as intended verification functionalities, and evaluate its security.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
evalg 2011 security objectives, http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e-valg/tekniskdok/Security_Objectives_v2.pdf
Pkcs#5, note = http://www.rsa.com/rsalabs/node.asp?id=2127
Adida, B.: Helios: Web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335–348. USENIX Association (2008)
Chaum, D.: Surevote: Technical overview. In: Proceedings of the Workshop on Trustworthy Elections, WOTE 2001 (2001)
CESG (Communications and Electronic Security Group). E-voting security study, annex C (2002), http://www.edemocracy.gov.uk/library/papers/study.pdf2002
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4) (1985)
Gjøsteen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010/380 (2010), http://eprint.iacr.org/
Helbach, J., Schwenk, J.: Secure Internet Voting with Code Sheets. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 166–177. Springer, Heidelberg (2007)
American National Standards Institute. Accredited standards committee x9 working draft. ANSI X9.42-1993: Public Key Cryptography for the Financial Services Industry: Management of Symmetric Algorithm Keys Using Diffie-Hellman (1994)
Jakobsson, M.: A Practical Mix. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 448–461. Springer, Heidelberg (1998)
Joaquim, R., Ribeiro, C.: Codevoting: protecting against malicious vote manipulation at the voter’s pc. In: Chaum, D., Kutylowski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) Frontiers of Electronic Voting. Dagstuhl Seminar Proceedings, vol. 07311. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)
Malkhi, D., Margo, O., Pavlov, E.: E-voting without ’Cryptography’. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 1–15. Springer, Heidelberg (2003)
Markus, J., Ari, J.: Millimix: Mixing in small batches. Technical report (1999)
Morales-Rocha, V., Soriano, M., Puiggali, J.: New voter verification scheme using pre-encrypted ballots. Computer Communications 32(7-10), 1219–1227 (2009)
Nguyen, L., Safavi-Naini, R.: Breaking and Mending Resilient Mix-Nets. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 66–80. Springer, Heidelberg (2003)
Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)
Storer, T.W.: Practical pollsterless remote electronic voting (2006)
Voutsis, N., Zimmermann, F.: Anonymous code lists for secure electronic voting over insecure mobile channels. In: Proceedings of Euro mGov. Sussex University, Brighton (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Allepuz, J.P., Castelló, S.G. (2012). Internet Voting System with Cast as Intended Verification. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-32747-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32746-9
Online ISBN: 978-3-642-32747-6
eBook Packages: Computer ScienceComputer Science (R0)