Advertisement

Browser Based Agile E-Voting System

  • Sriperumbuduru Kandala Simhalu
  • Keiji Takeda
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4846)

Abstract

In the recent past, in spite of several real world implementations available for Internet [browser-based] e-voting, there seems to be a pattern emerging, one of apathy towards improving voter convenience / participation. The goal of the proposed system evolves from the premise that, there should be a priority shift towards addressing the needs of the Voter, hence, most of the other requirements of this system, such as Security, Anonymity, Universal Verifiability, Individual Verifiability, Receipt-Freeness and Fairness are a direct by-product of this goal. In order to secure a higher voter participation, the proposed system considers the trade-offs between strict adherence to essential properties and practicality / user-convenience. To further secure the voter confidence/trust, a practical approach to Individual Verifiability has been implemented, without compromising the Receipt-Freeness property. So, with such flexibility and consumer-oriented approach, it is but evident that Agility is the hallmark of this project.

Keywords

E-Voting Anonymity Individual Verifiability Agile Voting 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brace Kimball, W.: Overview of Voting Equipment Usage in United States, Direct Recording Electronic(DRE) Voting. Kimball Brace’s Statement to United States Election Assistance Commission (May 5, 2004)Google Scholar
  2. 2.
    Kevin, C.: CRS Report for Congress, Internet Voting. Order Code RS20639 (January 31, 2003)Google Scholar
  3. 3.
    California Internet Voting Task Force: A Report on the Feasibility of Internet Voting (January 2000)Google Scholar
  4. 4.
    Kiayias, A., Michael, K., David, W.: An Internet Voting System Supporting User Privacy. In: Jesshope, C., Egan, C. (eds.) ACSAC 2006. LNCS, vol. 4186, Springer, Heidelberg (2006)Google Scholar
  5. 5.
    Rising, L., Janoff, N.S.: (2000) The Scrum Software Development Process for Small Teams. IEEE Software (July/August, 2000)Google Scholar
  6. 6.
    Niemi, R.G., Weisberg, H.F.: Controversies in Voting Behavior. CQ Press, Washington, D.C (2001)Google Scholar
  7. 7.
    VoteHere VHTi: Frequently Asked Questions, http://www.votehere.com/faq_toc.php
  8. 8.
    Cochran, D.: Secure internet voting in Ireland using the Open Source: Kiezen op Afstand (KOA) remote voting system. Master’s thesis, University College Dublin (2006)Google Scholar
  9. 9.
    Kim, K.: Killer Application of PKI to Internet Voting. In: IWAP 2002. LNCS, vol. 1233, Springer, Heidelberg (2002)Google Scholar
  10. 10.
    GNU.FREE: Heavy-Duty Internet Voting, http://www.j-dom.org/users/re.html
  11. 11.
    An Untraceable, Universally Verifiable Voting Scheme, Professor Philip Klein, Seminar in Cryptology (December 12, 1995)Google Scholar
  12. 12.
  13. 13.
    Krishna, S., Sampigethaya, S.K., Poovendran, R.: A Framework and Taxonomy for Comparison of Electronic Voting Schemes. Elsevier Journal of Computers and Security 25(2), 137–153 (2006)Google Scholar
  14. 14.
    Condorcet Internet Voting Service, http://www.cs.cornell.edu/andru/civs.html
  15. 15.
  16. 16.
  17. 17.
    VoteHereVHTi: Frequently Asked Questions, http://www.votehere.com/faq_toc.php
  18. 18.
  19. 19.
    Kiniry, J., Morkan, A., Cochran, D., Fairmichael, F., Chalin, P., Oostdijk, M., Hubbers, E.: The KOA remote voting system: A summary of work to date. In: Proceedings of Trustworthy Global Computing (2006)Google Scholar
  20. 20.
    Nijmeegs instituut voor informatica en informatiekunde. Security of Systems, http://www.sos.cs.ru.nl/research/koa/KiezenopAfstand2004
  21. 21.
    IETF RFC 4346: The Transport Layer Security (TLS) Protocol, Version 1.1. URL, http://www.ietf.org/rfc/rfc4346.txt
  22. 22.
    Alberto, O., Marco, V.: Man-In-The-Middle Attacks, http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-ornaghi-valleri.pdf
  23. 23.
    Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10(6), 74–84 (1977)CrossRefGoogle Scholar
  24. 24.
    Menezes, A., van Oorschot, P., Van stone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USAGoogle Scholar
  25. 25.
    Hellman, M.E.: An Overview of Public Key Cryptography. IEEE Communications Magazine, 42–49 (May 2002)Google Scholar
  26. 26.
    Advanced Encryption Standard(AES), Federal Information Processing Standards Publication 197 (November 26, 2001)Google Scholar
  27. 27.
    Neff, C.A.: Practical high certainty intent verification for encrypted votes. Draft(2004), http://www.votehere.net/vhti/documentation/vsv2.0.3638.pdf
  28. 28.
    Reynolds, D.J.: A method for electronic voting with coercionfree receipt. FEE 2005 (2005), Presentation, http://www.win.tue.nl/~berry/fee2005/presentations/reynolds.ppt
  29. 29.
    Moran, T., Naor, M.: Receipt Free Universally Verifiable Voting With Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  30. 30.
    Ronald, L.: Rivest.: The ThreeBallot Voting System (October 2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
  31. 31.
    Jones, H., Juang, J., Belote, G.: ThreeBallot in the Field (December 2006), http://courses.csail.mit.edu/6.857/projects/threeBallotPaper.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Sriperumbuduru Kandala Simhalu
    • 1
  • Keiji Takeda
    • 1
  1. 1.Carnegie Mellon CylabJapan

Personalised recommendations