Abstract
We present a Polling booth based Electronic Voting Scheme (PEVS) that allows eligible voters to cast their ballots inside polling booths. The ballot cast by a voter is inalterable and non-reusable. The scheme ensures vote-privacy since there is no link between the voter and the keys used for voting. A voter computer inside the booth performs the cryptographic task to construct the ballot to provide receipt-freeness. The scheme is coercion-resistant and modeled to fend off forced-abstention attacks, simulation attacks or randomization attacks. In addition, the scheme is both voter and universal verifiable. We formally analyze soundness (the eligibility of the voter, inalterability and non-reusability of the ballot), vote-privacy, receipt-freeness, and coercion-resistance in PEVS using the ProVerif tool. The analysis shows that PEVS satisfies these required properties. PEVS is the first polling booth based electronic voting scheme that satisfies all the requirements listed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Delaune, S., Kremer, S., Ryan, M.D.: Verifying Privacy-Type Properties of Electronic Voting Protocols. Research Report LSV-08-01, Laboratorie Specification et Verification, ENS Cachan, France (2008)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. Cryptology ePrint Archive, Report 2002/165 (2002)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant Electronic Elections. In: WPES 2005: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61â70. ACM, New York (2005), http://www.rsa.com/rsalabs/node.asp?id=2860
Based, M. A., MjĂžlsnes, S.F.: A Secure Internet Voting Scheme. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds.) ICA3PP 2011, Part II. LNCS, vol. 7017, pp. 141â152. Springer, Heidelberg (2011)
Backes, M., Hritcu, C., Maffei, M.: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. In: CSF 2008: Proceedings of the 21st IEEE Computer Security Foundations Symposium, Washington, USA, pp. 195â209 (2008)
Based, M.A., MjĂžlsnes, S.F.: A Non-Interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. In: Proceedings of the the 2nd Norwegian Information Security Conference (NISK 2009), pp. 148â160. Tapir Akademisk Forlag (2009) ISBN: 978-82-519-2492-4
Blanchet, B., Cheval, V., Allamigeon, X., Smyth, B.: ProVerif: Cryptographic Protocol Verifier in the Formal Model, http://www.proverif.ens.fr/ (visited, March 2012)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244â251. Springer, Heidelberg (1993)
Nielsen, C.R., Andersen, E.H., Nielson, H.R.: Static Analysis of a Voting Protocol. In: Proc. IFIP World Conference in IT Tools, pp. 21-30 (1996)
Sandler, D., Derr, K., Wallach, D.S.: Votebox. A Tamper-Evident, Verifiable Electronic Voting System. In: Proceedings of the 17th Conference on Security Symposium (SS 2008), pp. 349â364. USENIX Association, Berkeley (2008)
Benaloh, J.: Simple Verifiable Elections. In: Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop (2006)
Rivest, R.L.: The ThreeBallot Voting System, http://people.csail.mit.edu/rivest/Rivest-TheThreeBallotVotingSystem.pdf (accessed on August 18, 2012)
Kremer, S., Ryan, M.D.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186â200. Springer, Heidelberg (2005)
Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Elections (extended abstract). In: Proc. 26th Annual Symposium on Theory of Computing (STOC 1994), pp. 544â553. ACM Press (1994)
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 245â258. Springer, Heidelberg (2004)
Adida, B.: Helios: Web-based Open-Audit Voting. In: Proceedings of the Seventeenth Usenix Security Symposium, pp. 335-348. USENIX Association (2008)
Okamoto, T.: An Electronic Voting Scheme. In: Terashima, N., et al. (eds.) IFIP World Congress, pp. 21â30. Chapman & Hall Publications, London (1996)
Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a Secure Voting System. In: S&P 2008: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 354â368. IEEE Computer Society Press, Los Alamitos (2008)
Based, M. A., MjĂžlsnes, S.F.: Universally Composable NIZK Protocol in an Internet Voting Scheme. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 147â162. Springer, Heidelberg (2011)
Woo, T.Y.C., Lam, S.S.: A Semantic Model for Authentication Protocols. In: Proceedings IEEE Symposium on Research in Security and Privacy, Oakland, California, pp. 178â194 (May 1993)
Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2001), pp. 104â115. ACM Press, New York (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Based, M.A., Tsay, JK., MjĂžlsnes, S.F. (2012). PEVS: A Secure Electronic Voting Scheme Using Polling Booths. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Data and Knowledge Engineering. ICDKE 2012. Lecture Notes in Computer Science, vol 7696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34679-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-34679-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34678-1
Online ISBN: 978-3-642-34679-8
eBook Packages: Computer ScienceComputer Science (R0)