Skip to main content

Secure Internet Voting Based on Paper Ballots

  • Conference paper
Book cover Information Systems Security (ICISS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5352))

Included in the following conference series:

  • 1764 Accesses

Abstract

Internet voting will probably be one of the most significant achievements of the future information society. It will have an enormous impact on the election process making it fast, reliable and inexpensive. Nonetheless, so far the problem of providing security of remote voting is considered to be very difficult, as one has to take into account susceptibility of the voter’s PC to various cyber-attacks. As a result, most of the research effort is put into developing protocols and machines for poll-site electronic voting. Although these solutions yield promising results, most of them cannot be directly applied to Internet voting because of the secure platform problem. However, the cryptographic components they utilize may be very useful in the context of remote voting, too. This paper presents a scheme based on combination of mixnets and homomorphic encryption borrowed from robust poll-site voting, along with techniques recommended for remote voting – code sheets and test ballots. The protocol tries to minimize the trust put in voter’s PC by employing paper ballots distributed before elections. The voter uses the ballot to submit an encrypted vote, which is illegible for the potentially corrupt PC. The creation of paper ballots, as well as the decryption of votes, is performed by a group of cooperating trusted servers. As a result, the scheme is characterized by strong asymmetry – all computations are carried out on the server side. Hence, it does not require any additional hardware on the voter’s side. Furthermore, the scheme offers distributed trust, receipt-freeness and verifiability.

Supported by Ministry of Science and Higher Education, grant N N206 2701 33, 2007-2010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Beyond fear: Thinking sensibly about security in an uncertain world. Copernicus Books (2003)

    Google Scholar 

  2. CIVTF: A report on the feasibility of internet voting (2000), http://www.ss.ca.gov/executive/ivote/final_report.htm

  3. Oppliger, R.: How to address the secure platform problem for remote internet voting. In: Proceedings 5th Conf. on Security in Information Systems (SIS 2002), pp. 153–173 (2002)

    Google Scholar 

  4. Chaum, D.: Secret-ballot: True voter verifiable elections. IEEE Security and Privacy, 38–47 (2004)

    Google Scholar 

  5. Neff, A.: A verifiable secret shuffle and its application to e-voting. In: Samarati, P. (ed.) ACM CCS 2001, pp. 116–125. ACM Press, New York (2001)

    Google Scholar 

  6. Klonowski, M., Kutyłowski, M., Lauks, A., Zagórski, F.: A practical voting scheme with receipts. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 490–497. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Adida, B., Rivest, R.L.: Scratch and Vote: Self-contained paper-based cryptographic voting. In: Dingledine, R., Yu, T. (eds.) ACM Workshop on Privacy in the Electronic Society. ACM Press, New York (2006)

    Google Scholar 

  8. Ryan, P., Schneider, S.: Prêt à Voter with re-encryption mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 313–326. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Popovenuic, S., Hosp, B.: An introduction to punchscan. In: IAVoSS Workshop On Trustworthy Elections, WOTE (2006)

    Google Scholar 

  10. van de Graaf, J.: Merging prêt à voter and punchscan (2007), http://eprint.iacr.org/2007/269.pdf

  11. Xia, Z., Schneider, S., Heather, J.: Analysis, improvement and simplification of Prêt à Voter with paillier encryption. In: USENIX/ACCURATE Electronic Voting Technology Workshop (2008)

    Google Scholar 

  12. Rubin, A.: Security considerations for remote electronic voting over the internet (2001), http://avirubin.com/e-voting.security.pdf

  13. SureVote: E-voting system - overview (2001), http://www.vote.caltech.edu/wote01/pdfs/surevote.pdf

  14. Lee, B., Kim, K.: Receipt-free electronic voting scheme with a tamper-resistant randomizer. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 389–406. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Kutyłowski, M., Zagórski, F.: Verifiable internet voting solving secure platform problem. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 199–213. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy, pp. 354–368 (2008)

    Google Scholar 

  17. Young, A., Yung, M.: The dark side of black-box cryptography, or: Should we trust Capstone? In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109. Springer, Heidelberg (1996)

    Google Scholar 

  18. Estonian National Election Committee: E-voting system - overview (2006), http://www.vvk.ee/elektr/docs/Yldkirjeldus-eng.pdf

  19. Chaum, D., Pedersen, T.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  20. Park, C., Itoh, Kh., Kurosawa, K.: Efficient anonymous channel and all/nothing election scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 248–259. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  21. Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium, pp. 339–353 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nitschke, Ł. (2008). Secure Internet Voting Based on Paper Ballots. In: Sekar, R., Pujari, A.K. (eds) Information Systems Security. ICISS 2008. Lecture Notes in Computer Science, vol 5352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89862-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89862-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89861-0

  • Online ISBN: 978-3-540-89862-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics