Abstract
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Norden, L.: The machinery of democracy: Protecting elections in an electronic world. Technical report, Brennan Center Task Force on Voting System Security (October 2006), http://www.brennancenter.org/dynamic/subpages/download_file_38150.pdf
NIST: Threats to voting systems workshop (2005), http://vote.nist.gov/threats/
California Secretary of State: Top-to-bottom review (2007), http://www.sos.ca.gov/elections/elections/elections_vs.htm
Neff, C.A.: Practical high certainty intent verification for encrypted votes. VoteHere (2004), http://www.votehere.net/vhti/documentation
Adida, B., Neff, C.A.: Ballot casting assurance. In: EVT 2006: Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop, Berkeley, CA, USA, p. 7. USENIX Association (2006)
Popoveniuc, S., Hosp, B.: An introduction to Punchscan. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2006)
Fisher, K., Carback, R., Sherman, A.: Punchscan: Introduction and system definition of a high-integrity election system. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2006)
Rivest, R.: The ThreeBallot voting system. MIT (2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Adida, B., Rivest, R.L.: Scratch & Vote: Self-contained paper-based cryptographic voting. In: WPES 2006: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 29–40. ACM Press, New York (2006)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: Proc. 26th IEEE Symp. on Foundations of Comp. Science, Portland, pp. 372–382. IEEE, Los Alamitos (1985)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
The Center for Responsive Politics: Opensecrets, http://www.opensecrets.org
Kelsey, J.: Strategies for software attacks on voting machines. In: Threats to Voting Systems Workshop (2005), http://vote.nist.gov/threats/papers/stategies_for_software_attacks.pdf
Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Rivest, R., Smith, W.: Three voting protocols: ThreeBallot, VAV and Twin. In: Proceedings of USENIX/ACCURATE Electronic Voting Technology Workshop (EVT) (2007)
Strauss, C.: The trouble with triples: A critical review of the triple ballot (3ballot) scheme. part 1. Verified Voting New Mexico (2006), http://www.cs.princeton.edu/~appel/voting/Strauss-TroubleWithTriples.pdf
Strauss, C.: A critical review of the triple ballot voting system. part 2: Cracking the triple ballot encryption. draft version 1.5. Verified Voting New Mexico (2006) http://www.cs.princeton.edu/~appel/voting/Strauss-ThreeBallotCritique2v1.5.pdf
Clark, J., Essex, A., Adams, C.: On the security of ballot receipts in e2e voting systems. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2007)
Moran, T., Naor, M.: Split-ballot voting: Everlasting privacy with distributed trust. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2007)
Essex, A., Clark, J., Carback, R., Popoveniuc, S.: The Punchscan voting system: Vocomp competition submission (2007), http://www.punchscan.org/vocomp/PunchscanVocompSubmission.pdf
Moran, T., Naor, M.: Polling with physical envelopes: A rigorous analysis of a human-centric protocol. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 88–108. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kelsey, J., Regenscheid, A., Moran, T., Chaum, D. (2010). Attacking Paper-Based E2E Voting Systems. In: Chaum, D., et al. Towards Trustworthy Elections. Lecture Notes in Computer Science, vol 6000. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12980-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-12980-3_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12979-7
Online ISBN: 978-3-642-12980-3
eBook Packages: Computer ScienceComputer Science (R0)