Skip to main content

Secure Internet Voting with Code Sheets

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4896))

Abstract

Malware on Personal Computers is a major security issue today. This fact implies that all solutions intended to secure Internet-based voting have to be re-evaluated under the assumption that a local malware application is capable of controlling the interface between user and PC. We propose to use paper-based code sheets, originally introduced by Chaum, to overcome this problem, and for the first time give a security analysis of this solution. We show that a modified, 3-step-scheme, can be considered secure against local malware attacks. Our scheme could then particulary be used to held shareholder elections or votes in an associaton over the Internet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akkoyunlu, E.A., Ekanadham, K., Huber, R.V.: Some Constraints and Tradeoffs in the Design of Network Communications. ACM SIGOPS Operating Systems Review 9(5), 67–74 (1975)

    Article  Google Scholar 

  2. Adida, B., Rivest, R.: Scratch & Vote. In: Proceedings of the 5th workshop on privacy in the electronic socienty, pp. 29–40 (2006)

    Google Scholar 

  3. Chaum, D.: Blind signatures for untraceable payments. In: Advances in cryptology, pp. 199–203 (1982)

    Google Scholar 

  4. Chaum, D.: Sure Vote: Technical Overview. In: Proceedings of the workshop on trustworthy elections (WOTE 2001), presentation slides (2001), http://www.vote.caltech.edu/wote01/pdfs/surevote.pdf

  5. Chaum, D., Ryan, P., Schneider, S.: A Practical, voter-verifiable Election Scheme, Technical Report 880, School of computing science, Newcastle university (2004)

    Google Scholar 

  6. Cranor, L.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Cranor, L. (ed.) Proceedings of the Hawai’i International Conference on System Sciences (1997)

    Google Scholar 

  7. Website of the CyberVote Project, http://www.eucybervote.org

  8. Emigh, A.: The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. A Joint Report of the US Department of Homeland Security– SRI International Identity Theft Technology Council and the Anti-Phishing Working Group

    Google Scholar 

  9. Estonia to hold world’s first Internet election, http://www.pcpro.co.uk/news/105714/estonia-to-hold-worlds-first-internet-election.html

  10. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, Springer, Heidelberg (1993)

    Google Scholar 

  11. Gray, J.: Operating Systems. LNCS, vol. 60, pp. 393–481. Springer, Heidelberg (1978)

    Google Scholar 

  12. Grimes, R.: An SSL trojan unmasked, http://www.infoworld.com/article/06/03/03/75970_10OPsecadvise_1.html

  13. Herschberg, M.: Secure Electronic Voting Over the World Wide Web, Master Thesis, at the Massachusetts Institute of Technology (1997), http://theory.lcs.mit.edu/~cis/voting/herschberg-thesis/index.html

  14. Hof, S.: E-Voting an Biometric Systems? In: Proceedings Electronic Voting in Europe Technology, Law, Politics and Society. LNI P-47, pp. 63–72 (2004)

    Google Scholar 

  15. Polyas Website, Micromata Objects GmbH, http://www.polyas.de

  16. Oppliger, R.: How to Address the Secure Platform Problem for Remote Internet Voting. In: Proceedings 5th Conf. Security in Information Systems (SIS 2002), vdf Hochschulverlag, pp. 153–173 (2002), http://www.ifi.unizh.ch/~oppliger/Docs/sis_2002.pdf

  17. Wu, C., Sankaranarayana, R.: Internet Voting: Concerns and solutions. In: International Symposium on Cyber Worlds: Theories and Practices (2002)

    Google Scholar 

  18. http://www.theregister.co.uk/2006/05/09/botnet_master_ancheta_jailed/

  19. Rivest, R.: Electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 243–268. Springer, Heidelberg (2002)

    Google Scholar 

  20. Rivest, R.: The ThreeBallot Voting System. unpublished draft, version 10/1/06, comments appreciated, http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf

  21. Scheier, B.: Voting and Technology. Crypto-Gram  (2000), http://www.schneier.com/crypto-gram-0012.html

  22. Volkamer, M., Grimm, R.: Multiple Casts in Online Voting: Analyzing Chances. In: Electronic Voting (2006)

    Google Scholar 

  23. Weber, T.: Criminals ’may overwhelm the web, http://news.bbc.co.uk/1/hi/business/6298641.stm

  24. Zypries: Virtual general meetings. throughout Europe enhance the rights of shareholders, http://www.bmj.de/files/-/1739/Press%20Release%20in%20english.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ammar Alkassar Melanie Volkamer

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Helbach, J., Schwenk, J. (2007). Secure Internet Voting with Code Sheets. In: Alkassar, A., Volkamer, M. (eds) E-Voting and Identity. Vote-ID 2007. Lecture Notes in Computer Science, vol 4896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77493-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77493-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77492-1

  • Online ISBN: 978-3-540-77493-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics