Skip to main content

A Model for System-Based Analysis of Voting Systems

  • Conference paper
Security Protocols (Security Protocols 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5964))

Included in the following conference series:

  • 488 Accesses

Abstract

There has recently been keen interest in the threat analysis of voting systems. While it is important to verify the system itself, it has been found that certain vulnerabilities only become apparent when taking a “system-based” view, i.e. considering interactions between the various components of a scheme [1,2]. Threat analysis has so far been of three main forms: system-based, protocol-level and taxonomy check-lists. We discuss these approaches before presenting a model for system-based analysis of voting systems that is more systematic than previous work. The model is described in detail, and demonstrated with an example from a case study of the Randell-Ryan “Scratch Card” voting system [3].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems perspective. In: USENIX Security Symposium (2005)

    Google Scholar 

  2. Ryan, P.Y.A., Peacock, T.: Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle upon Tyne (2005)

    Google Scholar 

  3. Randell, B., Ryan, P.Y.A.: Voting technologies and trust. IEEE Security & Privacy (2006)

    Google Scholar 

  4. Gumbel, A.: Steal This Vote. Thunder’s Mouth Press, U.S.A (2005)

    Google Scholar 

  5. Rubin, A.: Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting. Morgan Road (2006)

    Google Scholar 

  6. Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Symposium on Security and Privacy, IEEE, Los Alamitos (2004)

    Google Scholar 

  7. Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical, voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Punchscan: (2006), http://www.punchscan.org

  9. VoteHere: (2006), http://www.votehere.net/default.php

  10. Rivest, R.L.: The ThreeBallot voting system. Unpublished draft (2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf

  11. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy 2(1), 38–47 (2004)

    Article  Google Scholar 

  12. Neff, A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.net/documentation/vhti

  13. Neff, A.: A verifiable secret shuffle and its application to e-voting. In: Conference on Computer and Communications Security, pp. 116–125. ACM, New York (2001)

    Google Scholar 

  14. Peacock, T.: Guess My Vote: a Study of Opacity and Information Flow in Voting Systems. PhD thesis, School of Computing Science, Newcastle University (2006)

    Google Scholar 

  15. Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. NIST: Workshop on developing an analysis of threats to voting systems (2005), http://vote.nist.gov/threats/

  17. Brennan Centre for Justice: The machinery of democracy: Protecting elections in an electronic world (2006), http://www.brennancenter.org

  18. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 244–251. ACM, New York (1992)

    Google Scholar 

  19. Mercuri, R.: A better ballot box? IEEE Spectrum Online (2002)

    Google Scholar 

  20. Ryan, P.Y.A.: Verified encrypted paper audit trails. Technical Report CS-TR-966, University of Newcastle upon Tyne (2006)

    Google Scholar 

  21. Adida, B.: Advances in Cryptographic Voting Systems. PhD thesis, Massachusetts Institute of Technology (2006)

    Google Scholar 

  22. Danezis, G.: Better Anonymous Communications. PhD thesis, University of Cambridge (2004)

    Google Scholar 

  23. Gogolewski, M., Klonowski, M., Kubiak, P., Kutylowski, M., Lauks, A., Zagorski, F.: Kleptographic attacks on e-voting schemes. In: Workshop on Electronic Voting and E-Government in the UK (2006)

    Google Scholar 

  24. Gogolewski, M., Klonowski, M., Kubiak, P., Kutylowski, M., Lauks, A., Zagorski, F.: Kleptographic attacks on e-election schemes with receipts. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 494–508. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  25. Jakobsson, M., Juels, A., Rivest, R.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium, pp. 339–353 (2002)

    Google Scholar 

  26. Bryans, J., Littlewood, B., Ryan, P.Y.A., Strigini, L.: E-voting: Design for dependability. In: Availability, Reliability and Security (ARES), IEEE, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tjøstheim, T., Peacock, T., Ryan, P.Y.A. (2010). A Model for System-Based Analysis of Voting Systems. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17773-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17772-9

  • Online ISBN: 978-3-642-17773-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics