Abstract
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. In this paper, some of the definitions related to the electoral procedure are introduced, different mechanisms for identification and authentication of voters are discussed, and then a protocol is proposed which breaks the link between identity of the voter and the vote itself very early in the electoral process, enabling both privacy and verifiability. The protocol is best suited for a system where votes are casted in polling stations, but recommendations for use in a remote voting scheme are also given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Langer, L., Jonker, H., Pieters,W.: Anonymity and verifiability in voting: understanding (un)linkability. In: Proceedings of the 12th Conference on Information and Communications Security, pp. 1–3 (2010)
Council of Europe: Operational and technical standards for e-voting, Recommendation and explanatory memorandum. Strassbourg: Council of Europe, (2004)
Suksi, M.: The Electoral Cycle: On the Right to Participate in the Electoral Process. In: Hinz, V.U., Suksi, M., (eds.) Election Elements: On the International Standards of Electoral Participation, pp. 1–42. Turku/Abo: Institute for Human Rights, Abo Akademi University (2003)
Krimmer, R., Triessnigm, S., Volkamer, M.: The development of remote e-voting around the world: a review of roads and directions, E-Voting and Identity (VOTE-ID 2007), p. 5 (2007)
Kusters, R., Truderung, T., Vogt, A.: Clash attacks on the verifiability of e-voting systems. In: IEEE Symposium on Security and Privacy (2012)
Rivest, R., Smith, W.: Three voting protocols: ThreeBallot, VAV and Twin. In: USENIX/ACCURATE Electronic Voting Technology (EVT 2007) (2007)
Wombat voting system (2011). http://www.wombat-voting.com/
Adida, B.: Helios: web-based open-audit voting. In: SS’08: Proceedings of the 17th conference on Security symposium, Berkeley, USENIX Association, pp. 335–348 (2008)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: 4th ACM Workshop on Privacy in the Electronic Society, pp. 61–70. Alexandria, USA (2005)
Benaloh, J., Lazarus, E.: The Trash Attack: An Attack on Verifiable Voting Systems and a Simple Mitigation. Technical Report MSR-TR-2011-115, Microsoft (2011)
Acknowledgments
The author would like to acknowledge the valuable comments and suggestions on the form of this paper from Professor Desimir Vucic.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Majstorović, D. (2016). Proposition of a Protocol for E-voting Systems that Breaks the Link Between the Voter and His Vote. In: Abraham, A., Wegrzyn-Wolska, K., Hassanien, A., Snasel, V., Alimi, A. (eds) Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015. Advances in Intelligent Systems and Computing, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-319-29504-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-29504-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29503-9
Online ISBN: 978-3-319-29504-6
eBook Packages: EngineeringEngineering (R0)