Skip to main content

Internet Voting System with Cast as Intended Verification

  • Conference paper
E-Voting and Identity (Vote-ID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7187))

Included in the following conference series:

Abstract

In remote electronic elections the voting client software is usually in charge of encoding the voting options chosen by the voter. Cast as intended verification methods can be used to audit this process, so that voters do not need to trust the voting client software. In this paper we present the revision of our initial proposal for the eValg2011 project for an Internet voting protocol providing cast as intended verification functionalities, and evaluate its security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.regjeringen.no/en/dep/krd/prosjekter/e-vote-2011-project/about-the-e-vote-project/presentation-of-the-project.html?id=598565

  2. evalg 2011 security objectives, http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e-valg/tekniskdok/Security_Objectives_v2.pdf

  3. Pkcs#5, note = http://www.rsa.com/rsalabs/node.asp?id=2127

  4. Adida, B.: Helios: Web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335–348. USENIX Association (2008)

    Google Scholar 

  5. Chaum, D.: Surevote: Technical overview. In: Proceedings of the Workshop on Trustworthy Elections, WOTE 2001 (2001)

    Google Scholar 

  6. CESG (Communications and Electronic Security Group). E-voting security study, annex C (2002), http://www.edemocracy.gov.uk/library/papers/study.pdf2002

  7. El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4) (1985)

    Google Scholar 

  8. Gjøsteen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010/380 (2010), http://eprint.iacr.org/

  9. Helbach, J., Schwenk, J.: Secure Internet Voting with Code Sheets. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 166–177. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. American National Standards Institute. Accredited standards committee x9 working draft. ANSI X9.42-1993: Public Key Cryptography for the Financial Services Industry: Management of Symmetric Algorithm Keys Using Diffie-Hellman (1994)

    Google Scholar 

  11. Jakobsson, M.: A Practical Mix. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 448–461. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Joaquim, R., Ribeiro, C.: Codevoting: protecting against malicious vote manipulation at the voter’s pc. In: Chaum, D., Kutylowski, M., Rivest, R.L., Ryan, P.Y.A. (eds.) Frontiers of Electronic Voting. Dagstuhl Seminar Proceedings, vol. 07311. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)

    Google Scholar 

  13. Malkhi, D., Margo, O., Pavlov, E.: E-voting without ’Cryptography’. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 1–15. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Markus, J., Ari, J.: Millimix: Mixing in small batches. Technical report (1999)

    Google Scholar 

  15. Morales-Rocha, V., Soriano, M., Puiggali, J.: New voter verification scheme using pre-encrypted ballots. Computer Communications 32(7-10), 1219–1227 (2009)

    Article  Google Scholar 

  16. Nguyen, L., Safavi-Naini, R.: Breaking and Mending Resilient Mix-Nets. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 66–80. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  18. Storer, T.W.: Practical pollsterless remote electronic voting (2006)

    Google Scholar 

  19. Voutsis, N., Zimmermann, F.: Anonymous code lists for secure electronic voting over insecure mobile channels. In: Proceedings of Euro mGov. Sussex University, Brighton (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Allepuz, J.P., Castelló, S.G. (2012). Internet Voting System with Cast as Intended Verification. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32747-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32746-9

  • Online ISBN: 978-3-642-32747-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics