Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 313))

  • 1948 Accesses

Abstract

In the recent years, the existence of end-to-end voter-verifiable (E2E) voting system had increased significantly. Some of the prospective ones have been used in a medium to large scale elections. We have also developed one (eVote). In this paper we review their capabilities to provide an individual and universally verifiable voting system, incoercibility and receipt-freeness to ensure election integrity. We compare some properties along with its resistance against malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Medeiros dos Santos W (2011) Preserving vote secrecy in end-to-end verifiable voting systems. Privacy, security, risk and trust, 2011 IEEE 3rd international conference on social computing, pp 1196–1201

    Google Scholar 

  2. Adida B (2008) Web-based open audit voting. Proceedings of the 17th USENIX security symposium, pp 335–348

    Google Scholar 

  3. Chaum D, Carback R, Clark J, Essex A, Popoveniuc S, Rivest RL, Ryan PYA, Shen E, Sherman AT (2008) Scantegrity II: end-to-end verifiability for optical scan election systems using invisible inks confirmation codes. EVT’08 Proceedings of the conference of electronic voting technology

    Google Scholar 

  4. Ryan PYA, Bismark D, Heather J, Schneider S, Zhe Xia (2009) Prêt à voter: a voter verifiable voting system. IEEE transactions on information forensics and security, Luxembourg, pp 662–673

    Google Scholar 

  5. Hubbers E, Jacobs B, Pieters W (2005) RIES – internet voting in action. Proceedings COMPSAC’05 Proceedings of the 29th annual international computer software and applications conference, vol 1, Washington DC, pp 417–424

    Google Scholar 

  6. Adida B, Neff CA (2006) Ballot casting assurance. In: Proceedings of the USENIX/Accurate electronic voting technology workshop 2006 on electronic voting technology workshop (EVT’06), USENIX Association, Berkeley, CA, pp 7–7

    Google Scholar 

  7. Juels A, Catalano D, Jakobsson M (2005) Coercion-resistent electronic elections. WPES’05 Proceedings of the 2005 ACM workshop on privacy in electronic society, New York, pp 61–70

    Google Scholar 

  8. Alberdi E, Strigini L, Leach K, Ryan P, Palanque P, Winckler M (2009) Gaining assurance in a voter-verifiable voting system. 2009 Second international conference on dependability, Athens, Greece, 18–23 June

    Google Scholar 

  9. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security and Privacy, vol 1, no 3. Oakland, CA, pp 32–44

    Google Scholar 

  10. Regenscheid A, Hasting N (2008) A threat analysis on UOCAVA voting systems. NISTIR 7551

    Google Scholar 

  11. Pardue H, Yasinsac A, Landry J (2010) Towards internet voting security: a threat tree risk assessment. 2010 5th International conference on risks and security of internet and systems (CRiSIS). Alabama, pp 1–7

    Google Scholar 

  12. Denial of Service/Distributed Denial of Service Managing DoS Attacks (2006) Trusted information sharing network for critical infrastructure election, Australia

    Google Scholar 

  13. Carback R, Chaum D, Clark J, Conway J, Essex A, Herrnson PS, Mayberry T, Popoveniuc S, Rivest RL, Shen E, Sherman AT, Vora PL (2010) Scantegrity II municipal election at Takoma Park: the First E2E binding governmental election with ballot privacy. USENIX Security’10 proceedings of the 19th USENIX conference on security. Berkeley, CA, pp 19

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lauretha Rura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rura, L., Issac, B., Haldar, M. (2015). Vulnerability Studies of E2E Voting Systems. In: Sobh, T., Elleithy, K. (eds) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Lecture Notes in Electrical Engineering, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-319-06773-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06773-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06772-8

  • Online ISBN: 978-3-319-06773-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics