Abstract
There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a “system-based” view, i.e. considering interactions between the various components of a scheme [1,2]. Threat analysis has so far been of three main forms: system-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for system-based analysis of voting systems that is more systematic than previous work. The model is described in detail, and demonstrated with an example from a case study of the Randell-Ryan “Scratch Card” voting system [3].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems perspective. In: USENIX Security Symposium (2005)
Ryan, P.Y.A., Peacock, T.: Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle upon Tyne (2005)
Randell, B., Ryan, P.Y.A.: Voting technologies and trust. IEEE Security & Privacy (2006)
Gumbel, A.: Steal This Vote. Thunder’s Mouth Press, U.S.A (2005)
Rubin, A.: Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting. Morgan Road (2006)
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Symposium on Security and Privacy, IEEE, Los Alamitos (2004)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical, voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Punchscan: (2006), http://www.punchscan.org
VoteHere: (2006), http://www.votehere.net/default.php
Rivest, R.L.: The ThreeBallot voting system. Unpublished draft (2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy 2(1), 38–47 (2004)
Neff, A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.net/documentation/vhti
Neff, A.: A verifiable secret shuffle and its application to e-voting. In: Conference on Computer and Communications Security, pp. 116–125. ACM, New York (2001)
Peacock, T.: Guess My Vote: a Study of Opacity and Information Flow in Voting Systems. PhD thesis, School of Computing Science, Newcastle University (2006)
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005)
NIST: Workshop on developing an analysis of threats to voting systems (2005), http://vote.nist.gov/threats/
Brennan Centre for Justice: The machinery of democracy: Protecting elections in an electronic world (2006), http://www.brennancenter.org
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 244–251. ACM, New York (1992)
Mercuri, R.: A better ballot box? IEEE Spectrum Online (2002)
Ryan, P.Y.A.: Verified encrypted paper audit trails. Technical Report CS-TR-966, University of Newcastle upon Tyne (2006)
Adida, B.: Advances in Cryptographic Voting Systems. PhD thesis, Massachusetts Institute of Technology (2006)
Danezis, G.: Better Anonymous Communications. PhD thesis, University of Cambridge (2004)
Gogolewski, M., Klonowski, M., Kubiak, P., Kutylowski, M., Lauks, A., Zagorski, F.: Kleptographic attacks on e-voting schemes. In: Workshop on Electronic Voting and E-Government in the UK (2006)
Gogolewski, M., Klonowski, M., Kubiak, P., Kutylowski, M., Lauks, A., Zagorski, F.: Kleptographic attacks on e-election schemes with receipts. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 494–508. Springer, Heidelberg (2006)
Jakobsson, M., Juels, A., Rivest, R.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium, pp. 339–353 (2002)
Bryans, J., Littlewood, B., Ryan, P.Y.A., Strigini, L.: E-voting: Design for dependability. In: Availability, Reliability and Security (ARES), IEEE, Los Alamitos (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tjøstheim, T., Peacock, T., Ryan, P.Y.A. (2010). A Model for System-Based Analysis of Voting Systems. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-17773-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17772-9
Online ISBN: 978-3-642-17773-6
eBook Packages: Computer ScienceComputer Science (R0)