Skip to main content

Why Is Online Voting Still Largely a Black Box?

  • Conference paper
  • First Online:
Computer Security. ESORICS 2022 International Workshops (ESORICS 2022)

Abstract

Online elections and polls are increasingly gaining ground. Since the beginning of the pandemic, many associations, companies and agencies opted for online elections at some point. Yet, most of these elections use online voting systems that are a black box for voters, even though the current state of research offers cryptographic means that would allow voters to detect potential manipulations, e.g., by methods for end-to-end (E2E) verifiability. In this paper, we report on qualitative exploratory research to determine the reasons for this situation. We evaluate responses from a panel at a national conference in Germany by specialists from official agencies, industry, and academia, whom we asked why election organizers still largely opt for systems that are not verifiable and how this could be changed. We furthermore present an exploratory study in which we asked program committee members from relevant international conferences to assess the obtained panel responses on their accuracy, relevance, and completeness. Finally, we discuss possible next steps for strengthening our findings and how to implement them to see more verifiable voting systems being used in the future.

This work was supported by funding from the topic Engineering Secure Systems of the Helmholtz Association (HGF) and by KASTEL Security Research Labs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The main purpose consisted in introducing the comparison of black-box and verifiable voting systems to the audience.

References

  1. Alvarez, R.M., Levin, I., Pomares, J., Leiras, M.: Voting made safe and easy: the impact of e-voting on citizen perceptions. Polit. Sci. Res. Methods 1(1), 117–137 (2013). https://doi.org/10.1017/psrm.2013.2

    Article  Google Scholar 

  2. Beckert, B., et al.: Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen. Technical report, Karlsruhe Institute of Technology (KIT) (2021). https://doi.org/10.5445/IR/1000137300

  3. Bernhard, M., et al.: Public evidence from secret ballots. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Schürmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 84–109. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68687-5_6

    Chapter  Google Scholar 

  4. Kersting, N., Baldersheim, H. (eds.): Electronic Voting and Democracy: A Comparative Analysis. Palgrave Macmillan (2004). https://doi.org/10.1057/9780230523531

  5. Licht, N., Duenas-Cid, D., Krivonosova, I., Krimmer, R.: To i-vote or not to i-vote: drivers and barriers to the implementation of internet voting. In: Krimmer, R., et al. (eds.) E-Vote-ID 2021. LNCS, vol. 12900, pp. 91–105. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86942-7_7

    Chapter  Google Scholar 

  6. Marky, K., Gerber, P., Günther, S., Khamis, M., Fries, M., Mühlhäuser, M.: Investigating state-of-the-art practices for fostering subjective trust in online voting through interviews. In: 31st USENIX Security Symposium (USENIX Security 2022), Boston, MA. USENIX Association (2022). https://www.usenix.org/conference/usenixsecurity22/presentation/marky

  7. Olembo, M.M., Bartsch, S., Volkamer, M.: Mental models of verifiability in voting. In: Heather, J., Schneider, S., Teague, V. (eds.) Vote-ID 2013. LNCS, vol. 7985, pp. 142–155. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39185-9_9

    Chapter  Google Scholar 

  8. Solvak, M.: Does vote verification work: usage and impact of confidence building technology in internet voting. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 213–228. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60347-2_14

    Chapter  Google Scholar 

  9. Teague, V.: Which E-voting problems do we need to solve? In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 3–7. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_1

    Chapter  Google Scholar 

  10. Zollinger, M., Distler, V., Rønne, P.B., Ryan, P.Y.A., Lallemand, C., Koenig, V.: User experience design for e-voting: how mental models align with security mechanisms. CoRR abs/2105.14901 (2021). https://arxiv.org/abs/2105.14901

  11. Zollinger, M.-L., Estaji, E., Ryan, P.Y.A., Marky, K.: “Just for the sake of transparency’’: exploring voter mental models of verifiability. In: Krimmer, R., et al. (eds.) E-Vote-ID 2021. LNCS, vol. 12900, pp. 155–170. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-86942-7_11

    Chapter  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the participants in the panel discussion as well as the anonymous participants in the exploratory study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Kirsten .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kirsten, M., Volkamer, M., Beckert, B. (2023). Why Is Online Voting Still Largely a Black Box?. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25460-4_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25459-8

  • Online ISBN: 978-3-031-25460-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics