Abstract
In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.
This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mercuri, R.: A Better Ballot Box? IEEE Spectrum Online, 46–50 (October 2002)
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.: Analysis of an Electronic Voting System. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, California, May 2004, pp. 27–42. IEEE Computer Society Press, Los Alamitos (2004)
Fujioka, Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Maaten, E.: Towards remote e-voting: Estonian case. In: Electronic Voting in Europe Proceedings of the 1st International Workshop on Electronic Voting, pp. 83–100 (2004)
Cetinkaya, O., Cetinkaya, D.: Verification and Validation Issues in Electronic Voting. The Electronic Journal of e-Government 5(2), 117–126 (2007)
Neff, A.C., Adler, J.: Verifiable e-Voting: Indisputable Electronic Elections at Polling Places. VoteHere Inc. (2003), http://votehere.com/vhti/documentation/VH_VHTi_WhitePaper.pdf
CCMB, Common Criteria for Information Technology Security Evaluation, version 3.1, CCMB-2006-09-004 (2006)
Oksana, S.: A Protection Profile and Its Content. In: SIBCON 2005 Proceeding, pp. 60–64 (2005)
Volkamer, M., Vogt, R.: Digitales wahlstift-system. Common Criteria Protection Profile BSI-PP-0031. Bundesamt für Sicherheit in der Informationstechnik (2006)
Secretariat general de la defense nationale, Protection Profile: Machine a voter, PP-CIVIS (2006), http://www.commoncriteriaportal.org/files/ppfiles/pp0604.pdf
IEEE P1583 SCC 38, IEEE P1583TM/D5.0 Draft standard for the Evaluation of Voting Equipment (2005)
Lee, Y., Lee, K., Kim, S., Won, D.: Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts. In: Proc. of IAVoSS Workshop On Trustworthy Election (WOTE 2006), Cambridge, United Kingdom, pp. 145–152 (2006)
Sako, K., Kilian, J.: Reciept-free Mix-Type Voting Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)
Rubin, A.: Avi Rubin’s e-voting page, http://avirubin.com/vote/
VSRW 2006 Threat Analyses for Voting System Categories (2006), http://vote.cs.gwu.edu/vsrw2006/
WOTE 2001 Workshop on Trustworthy Elections, http://www.vote.caltech.edu/wote01/
FEE2005 Workshop Frontiers in Electronic Elections, http://www.win.tue.nl/~berry/fee2005/program.html
Poulsenm, K.: E-Voting security debate comes home, http://www.securityfocus.com/news/2197
Morphy, E.: Study: Hackers Could Change E-Voting Machine Results, http://www.technewsworld.com/story/58572.html
McCullagh, D.: E-voting hobbled by security concerns, http://news.cnet.com/E-voting-hobbled-by-security-concerns/2100-1028_3-5889705.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K., Lee, Y., Won, D., Kim, S. (2010). Protection Profile for Secure E-Voting Systems. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-12827-1_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12826-4
Online ISBN: 978-3-642-12827-1
eBook Packages: Computer ScienceComputer Science (R0)