Abstract
In the recent years, the existence of end-to-end voter-verifiable (E2E) voting system had increased significantly. Some of the prospective ones have been used in a medium to large scale elections. We have also developed one (eVote). In this paper we review their capabilities to provide an individual and universally verifiable voting system, incoercibility and receipt-freeness to ensure election integrity. We compare some properties along with its resistance against malicious attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Medeiros dos Santos W (2011) Preserving vote secrecy in end-to-end verifiable voting systems. Privacy, security, risk and trust, 2011 IEEE 3rd international conference on social computing, pp 1196–1201
Adida B (2008) Web-based open audit voting. Proceedings of the 17th USENIX security symposium, pp 335–348
Chaum D, Carback R, Clark J, Essex A, Popoveniuc S, Rivest RL, Ryan PYA, Shen E, Sherman AT (2008) Scantegrity II: end-to-end verifiability for optical scan election systems using invisible inks confirmation codes. EVT’08 Proceedings of the conference of electronic voting technology
Ryan PYA, Bismark D, Heather J, Schneider S, Zhe Xia (2009) Prêt à voter: a voter verifiable voting system. IEEE transactions on information forensics and security, Luxembourg, pp 662–673
Hubbers E, Jacobs B, Pieters W (2005) RIES – internet voting in action. Proceedings COMPSAC’05 Proceedings of the 29th annual international computer software and applications conference, vol 1, Washington DC, pp 417–424
Adida B, Neff CA (2006) Ballot casting assurance. In: Proceedings of the USENIX/Accurate electronic voting technology workshop 2006 on electronic voting technology workshop (EVT’06), USENIX Association, Berkeley, CA, pp 7–7
Juels A, Catalano D, Jakobsson M (2005) Coercion-resistent electronic elections. WPES’05 Proceedings of the 2005 ACM workshop on privacy in electronic society, New York, pp 61–70
Alberdi E, Strigini L, Leach K, Ryan P, Palanque P, Winckler M (2009) Gaining assurance in a voter-verifiable voting system. 2009 Second international conference on dependability, Athens, Greece, 18–23 June
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security and Privacy, vol 1, no 3. Oakland, CA, pp 32–44
Regenscheid A, Hasting N (2008) A threat analysis on UOCAVA voting systems. NISTIR 7551
Pardue H, Yasinsac A, Landry J (2010) Towards internet voting security: a threat tree risk assessment. 2010 5th International conference on risks and security of internet and systems (CRiSIS). Alabama, pp 1–7
Denial of Service/Distributed Denial of Service Managing DoS Attacks (2006) Trusted information sharing network for critical infrastructure election, Australia
Carback R, Chaum D, Clark J, Conway J, Essex A, Herrnson PS, Mayberry T, Popoveniuc S, Rivest RL, Shen E, Sherman AT, Vora PL (2010) Scantegrity II municipal election at Takoma Park: the First E2E binding governmental election with ballot privacy. USENIX Security’10 proceedings of the 19th USENIX conference on security. Berkeley, CA, pp 19
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Rura, L., Issac, B., Haldar, M. (2015). Vulnerability Studies of E2E Voting Systems. In: Sobh, T., Elleithy, K. (eds) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Lecture Notes in Electrical Engineering, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-319-06773-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-06773-5_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06772-8
Online ISBN: 978-3-319-06773-5
eBook Packages: EngineeringEngineering (R0)