Skip to main content

PEVS: A Secure Electronic Voting Scheme Using Polling Booths

  • Conference paper
Data and Knowledge Engineering (ICDKE 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7696))

Included in the following conference series:

Abstract

We present a Polling booth based Electronic Voting Scheme (PEVS) that allows eligible voters to cast their ballots inside polling booths. The ballot cast by a voter is inalterable and non-reusable. The scheme ensures vote-privacy since there is no link between the voter and the keys used for voting. A voter computer inside the booth performs the cryptographic task to construct the ballot to provide receipt-freeness. The scheme is coercion-resistant and modeled to fend off forced-abstention attacks, simulation attacks or randomization attacks. In addition, the scheme is both voter and universal verifiable. We formally analyze soundness (the eligibility of the voter, inalterability and non-reusability of the ballot), vote-privacy, receipt-freeness, and coercion-resistance in PEVS using the ProVerif tool. The analysis shows that PEVS satisfies these required properties. PEVS is the first polling booth based electronic voting scheme that satisfies all the requirements listed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Delaune, S., Kremer, S., Ryan, M.D.: Verifying Privacy-Type Properties of Electronic Voting Protocols. Research Report LSV-08-01, Laboratorie Specification et Verification, ENS Cachan, France (2008)

    Google Scholar 

  2. Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. Cryptology ePrint Archive, Report 2002/165 (2002)

    Google Scholar 

  3. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant Electronic Elections. In: WPES 2005: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70. ACM, New York (2005), http://www.rsa.com/rsalabs/node.asp?id=2860

    Google Scholar 

  4. Based, M. A., Mjþlsnes, S.F.: A Secure Internet Voting Scheme. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds.) ICA3PP 2011, Part II. LNCS, vol. 7017, pp. 141–152. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Backes, M., Hritcu, C., Maffei, M.: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. In: CSF 2008: Proceedings of the 21st IEEE Computer Security Foundations Symposium, Washington, USA, pp. 195–209 (2008)

    Google Scholar 

  6. Based, M.A., Mjþlsnes, S.F.: A Non-Interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. In: Proceedings of the the 2nd Norwegian Information Security Conference (NISK 2009), pp. 148–160. Tapir Akademisk Forlag (2009) ISBN: 978-82-519-2492-4

    Google Scholar 

  7. Blanchet, B., Cheval, V., Allamigeon, X., Smyth, B.: ProVerif: Cryptographic Protocol Verifier in the Formal Model, http://www.proverif.ens.fr/ (visited, March 2012)

  8. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  9. Nielsen, C.R., Andersen, E.H., Nielson, H.R.: Static Analysis of a Voting Protocol. In: Proc. IFIP World Conference in IT Tools, pp. 21-30 (1996)

    Google Scholar 

  10. Sandler, D., Derr, K., Wallach, D.S.: Votebox. A Tamper-Evident, Verifiable Electronic Voting System. In: Proceedings of the 17th Conference on Security Symposium (SS 2008), pp. 349–364. USENIX Association, Berkeley (2008)

    Google Scholar 

  11. Benaloh, J.: Simple Verifiable Elections. In: Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop (2006)

    Google Scholar 

  12. Rivest, R.L.: The ThreeBallot Voting System, http://people.csail.mit.edu/rivest/Rivest-TheThreeBallotVotingSystem.pdf (accessed on August 18, 2012)

  13. Kremer, S., Ryan, M.D.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Elections (extended abstract). In: Proc. 26th Annual Symposium on Theory of Computing (STOC 1994), pp. 544–553. ACM Press (1994)

    Google Scholar 

  15. Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 245–258. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Adida, B.: Helios: Web-based Open-Audit Voting. In: Proceedings of the Seventeenth Usenix Security Symposium, pp. 335-348. USENIX Association (2008)

    Google Scholar 

  17. Okamoto, T.: An Electronic Voting Scheme. In: Terashima, N., et al. (eds.) IFIP World Congress, pp. 21–30. Chapman & Hall Publications, London (1996)

    Google Scholar 

  18. Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a Secure Voting System. In: S&P 2008: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 354–368. IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

  19. Based, M. A., Mjþlsnes, S.F.: Universally Composable NIZK Protocol in an Internet Voting Scheme. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 147–162. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  20. Woo, T.Y.C., Lam, S.S.: A Semantic Model for Authentication Protocols. In: Proceedings IEEE Symposium on Research in Security and Privacy, Oakland, California, pp. 178–194 (May 1993)

    Google Scholar 

  21. Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115. ACM Press, New York (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Based, M.A., Tsay, JK., MjĂžlsnes, S.F. (2012). PEVS: A Secure Electronic Voting Scheme Using Polling Booths. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Data and Knowledge Engineering. ICDKE 2012. Lecture Notes in Computer Science, vol 7696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34679-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34679-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34678-1

  • Online ISBN: 978-3-642-34679-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics