Abstract
This paper presents SEAS, the Secure E-voting Applet System, a protocol for implementing a secure and private system for polling over computer networks, usable in distributed organizations whose members may range up to dozens of thousands. We consider an architecture requiring the minimum number of servers involved in the validation and voting phases. Sensus, [7], a well known e-voting protocol, requires only two servers, namely a validator and a tallier. Even if satisfying most of the security requirements of an e-voting system, Sensus suffers of a vulnerability that allows one of the entities involved in the election process to cast its own votes in place of those that abstain from the vote. SEAS is a portable and flexible system that preserves the lightness of Sensus, but it avoids the mentioned weakness. We propose a prototype implementation of SEAS based on Java applet and XML technology.
Work partially supported by MIUR Project: “ Strumenti, Ambienti e Applicazioni Innovative per la Società dell’Informazione”, sottoprogetto SP1: Reti INTERNET: “efficienza, integrazione e sicurezza”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Askoxylakis, I.G., Kastanis, D.D., Traganitis, A.P.: M-commerce api package for mobile phones. ERCIM newsletter 54, Special Theme: Applications and Service Platforms for the Mobile User (2003)
Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Election. In: Proc. of ACM STOC 1994, pp. 544–553 (1994)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Proc. of Crypto 1982, Plenum, NY, pp. 199–203 (1983)
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1(1), 65–75 (1988)
Cranor, L., Cytron, R.K.: Sensor: A Security-Conscious Electronic Polling System for the Internet. In: Proc. of HICSS 1997 (1997)
Focardi, R., Gorrieri, R., Martinelli, F.: Non Interference for the Analysis of Cryptographic Protocols. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 354–372. Springer, Heidelberg (2000)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Election. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–260. Springer, Heidelberg (1993)
Housley, R., Ford, W., Polk, W., Solo, D.: RFC 2459: Internet X.509 Public Key Infrastructure Certificate and CRL Profile, IETF (1999), http://www.ietf.org/rfc/rfc2459.txt
Karro, J., Wang, J.: Towards a Practical, Secure, and Very Large Scale Online Election. In: Proc. of ACSAC 1999, pp. 161–169. IEEE Computer Society Press, Los Alamitos (1999)
Magkos, E., Burmester, M., Chrissikopoulos, V.: Receipt-Freeness in Large-Scale Elections without Untappable Channels. In: I3E, pp. 683–694 (2001)
Pelagatti, S.: Structured development of parallel programs. Taylor & Francis, Abington (1997)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: SDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen, pp. 451–463 (1991)
Ray, I., Ray, I., Narasimhamurthi, N.: An Anonymous Electronic Voting Protocol for Voting over the Internet. In: Proc. of WECWIS 2001, pp. 188–191. IEEE Computer Society Press, Los Alamitos (2001)
Rubin, A.D.: Security Considerations for Remote Electronic Voting. In: Proc. of 29th Research Conference on Communication, Information and Internet Policy (TPRC 2001) (2001)
Ryan, P., Bryans, J.: Security and trust in digital voting systems, pp. 113–120 (2003), Proc. of FAST 2003, IIT TR-10/2003
Ryan, P.Y.A., Schneider, S.A., Goldsmith, M.H., Lowe, G., Roscoe, A.W.: Modelling and Analysis of Security Protocols. Addison-Wesley Publishing Co., Reading (2000)
Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 198–218. Springer, Heidelberg (1996)
Shmatikov, V.: Probabilistic model checking of an anonymity system. Accepted to Journal of Computer Security (selected papers of CSFW-15) (2004)
Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous Connections and Onion Routing. In: IEEE Symposium on Security and Privacy, pp. 44–54 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., Vaccarelli, A. (2004). SEAS: A Secure E-Voting Applet System. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds) Software Security - Theories and Systems. ISSS 2003. Lecture Notes in Computer Science, vol 3233. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37621-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-37621-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23635-1
Online ISBN: 978-3-540-37621-7
eBook Packages: Springer Book Archive