Skip to main content

Protection Profile for Secure E-Voting Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6047))

Abstract

In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.

This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mercuri, R.: A Better Ballot Box? IEEE Spectrum Online, 46–50 (October 2002)

    Google Scholar 

  2. Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.: Analysis of an Electronic Voting System. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, California, May 2004, pp. 27–42. IEEE Computer Society Press, Los Alamitos (2004)

    Chapter  Google Scholar 

  3. Fujioka, Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    Google Scholar 

  4. Maaten, E.: Towards remote e-voting: Estonian case. In: Electronic Voting in Europe Proceedings of the 1st International Workshop on Electronic Voting, pp. 83–100 (2004)

    Google Scholar 

  5. Cetinkaya, O., Cetinkaya, D.: Verification and Validation Issues in Electronic Voting. The Electronic Journal of e-Government 5(2), 117–126 (2007)

    MathSciNet  Google Scholar 

  6. Neff, A.C., Adler, J.: Verifiable e-Voting: Indisputable Electronic Elections at Polling Places. VoteHere Inc. (2003), http://votehere.com/vhti/documentation/VH_VHTi_WhitePaper.pdf

  7. CCMB, Common Criteria for Information Technology Security Evaluation, version 3.1, CCMB-2006-09-004 (2006)

    Google Scholar 

  8. Oksana, S.: A Protection Profile and Its Content. In: SIBCON 2005 Proceeding, pp. 60–64 (2005)

    Google Scholar 

  9. Volkamer, M., Vogt, R.: Digitales wahlstift-system. Common Criteria Protection Profile BSI-PP-0031. Bundesamt für Sicherheit in der Informationstechnik (2006)

    Google Scholar 

  10. Secretariat general de la defense nationale, Protection Profile: Machine a voter, PP-CIVIS (2006), http://www.commoncriteriaportal.org/files/ppfiles/pp0604.pdf

  11. IEEE P1583 SCC 38, IEEE P1583TM/D5.0 Draft standard for the Evaluation of Voting Equipment (2005)

    Google Scholar 

  12. Lee, Y., Lee, K., Kim, S., Won, D.: Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts. In: Proc. of IAVoSS Workshop On Trustworthy Election (WOTE 2006), Cambridge, United Kingdom, pp. 145–152 (2006)

    Google Scholar 

  13. Sako, K., Kilian, J.: Reciept-free Mix-Type Voting Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)

    Google Scholar 

  14. Rubin, A.: Avi Rubin’s e-voting page, http://avirubin.com/vote/

  15. VSRW 2006 Threat Analyses for Voting System Categories (2006), http://vote.cs.gwu.edu/vsrw2006/

  16. WOTE 2001 Workshop on Trustworthy Elections, http://www.vote.caltech.edu/wote01/

  17. FEE2005 Workshop Frontiers in Electronic Elections, http://www.win.tue.nl/~berry/fee2005/program.html

  18. Poulsenm, K.: E-Voting security debate comes home, http://www.securityfocus.com/news/2197

  19. Morphy, E.: Study: Hackers Could Change E-Voting Machine Results, http://www.technewsworld.com/story/58572.html

  20. McCullagh, D.: E-voting hobbled by security concerns, http://news.cnet.com/E-voting-hobbled-by-security-concerns/2100-1028_3-5889705.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K., Lee, Y., Won, D., Kim, S. (2010). Protection Profile for Secure E-Voting Systems. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12827-1_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12826-4

  • Online ISBN: 978-3-642-12827-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics