skip to main content
10.1145/3551504.3551519acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceeegovConference Proceedingsconference-collections
research-article

Recommendation CM/REC(2017)5 of the Council of Europe and an Analysis of eVoting Protocols

Published:25 October 2022Publication History

ABSTRACT

Electronic voting via the Internet holds a number of promises, particularly in relation to citizens abroad and it may also replace postal voting, which is subject to postal delays and insecure lines of communication. This paper conducts an in-depth analysis of two prominent eVoting protocols, namely the Token protocol and the Envelope protocol explaining their strengths and weaknesses in relation to the Recommendations of the Council of Europe CM/Rec(2017)5. The findings show that Envelope protocols do not fulfil the requirements of the Recommendations, whereas Token protocols can fulfil the requirements, providing certain technical provisions are met.

References

  1. Recommendation Rec(2004)11 adopted by the Committee of Ministers of the Council of Europe on 30 September 2004 and explanatory memorandum, http://www.coe.int/t/dgap/goodgovernance/Activities/Key-Texts/ Recommendations/Rec(2004)11_Eng_Evoting_and_Expl_Memo_en.pdfGoogle ScholarGoogle Scholar
  2. Recommendation CM/Rec(2017)5 of the Committee of Ministers to member States on standards for e-voting, http://rm.coe.int/0900001680726f6fGoogle ScholarGoogle Scholar
  3. Explanatory Memorandum to Recommendation CM/Rec(2017)5 of the Committee of Ministers to member States on standards for e-voting, http://search.coe.int/cm/Pages/result_details.aspx?ObjectID=090000168071bc84Google ScholarGoogle Scholar
  4. Guidelines on the implementation of the provisions of Recommendation CM/Rec(2017)5 on standards for e-voting, http://search.coe.int/cm/Pages/result_details.aspx?ObjectID=0900001680726c0bGoogle ScholarGoogle Scholar
  5. A. Prosser, R. Kofler, R. Krimmer, M. Unger. E-Voting Election Test to the Austrian Federal Presidency Election 2004, Working Paper 02/2004 des Institut für Informationsverarbeitung und -wirtschaft der Wirtschaftsuniversität, 2004, WienGoogle ScholarGoogle Scholar
  6. A. Prosser, R. Müller-Török. E-Democracy: Eine neue Qualität im demokratischen Entscheidungsprozess, in Wirtschaftsinformatik, 44, 2002, 6, p. 545 – 556.Google ScholarGoogle ScholarCross RefCross Ref
  7. D. Bagnato. The Impact of the Council of Europe Recommendation CM/Rec(2017)5 on Evoting Protocols found in A. Nemeslaki, A. Prosser, D. Scola, T. Szadeczky (eds.), CEE e/Dem and e/Gov Days 2019, Cyber Security and eGovernment, Wien, 2019, p. 59Google ScholarGoogle Scholar
  8. E. Maaten. Towards remote e-voting: Estonian case in A. Prosser and R. Krimmer (eds), Electronic Voting in Europe – Technology, Law, Politics and Society, GI-Edition, Lecture Notes in Informatics, p. 83-90.Google ScholarGoogle Scholar
  9. Estonian Parliament, I-votes, https://www.valimised.ee/sites/default /files/uploads/eng/ Verification_of_I-Votes.pdfGoogle ScholarGoogle Scholar
  10. State Electoral Office of Estonia, General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia, Tallinn, 2017, https://www.valimised.ee/sites/default/files/uploads/eng/IVXV-UK-1.0-eng.pdfGoogle ScholarGoogle Scholar
  11. Estonian National Electoral Committee, E-Voting System, General Overview, Tallinn, 2005-2010, https://www.valimised.ee/sites/default/files/uploads/eng/General_ Description_E-Voting_2010.pdfGoogle ScholarGoogle Scholar
  12. D. Springall, T. finkenauer, Z. Durumeric, J. Kitcat, H. Hursti, M. Macalpine, J.A. Halderman. Security Analysis of the Estonian Internet Voting System, https://jhalderm.com/pub/papers/ivoting-ccs14.pdfGoogle ScholarGoogle Scholar
  13. RFC 5246, The Transport Layer Security (TLS) Protocol, https://tools.ietf.org/html/rfc5246Google ScholarGoogle Scholar
  14. R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. 1977. http://people.csail.mit.edu/rivest/Rsapaper.pdfGoogle ScholarGoogle Scholar
  15. D. Chaum. Blind Signatures for Untraceable Payments, 1983. found in: D. Chaum, R.L. Rivest, A.T. Sherman, (eds), Advances in Cryptology, Springer, Boston, MA, https://doi.org/10.1007/978-1-4757-0602-4_18Google ScholarGoogle ScholarCross RefCross Ref
  16. Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard (AES), 2001, http://nvlpubs.nist.gov/nistpubs/ FIPS/NIST.FIPS. 197.pdfGoogle ScholarGoogle Scholar
  17. A. Shamir. How to share a secret. 1979. Comm. ACM, 22, pp. 612-613Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Prosser, R. Kofler, R. Krimmer, M. Unger. Implementation of Quorum-Based Decisions in an Election Committee, Proceedings of DEXA/EGOV in R. Traunmüller, (ed.): Lecture Notes in Computer Science LNCS 3183, 2004, Springer, BerlinGoogle ScholarGoogle ScholarCross RefCross Ref
  19. OASIS-Open, OASIS Security Services (SAML), download from https://www.oasis-open.org/committees/tc_home.php?wgabbrev=securityGoogle ScholarGoogle Scholar
  20. A. Balthasar, A. Prosser. E-Voting in der „sonstigen Selbstverwaltung“ – Anmerkungen zum Beschluss des VfGH vom 30. Juni 2011, B1149, und zum Erkenntnis des VfGH vom 13. Dezember 2011, V 85-96, Journal für Rechtspolitik 20:1 (2012), pp. 47-86.Google ScholarGoogle Scholar
  21. I. White. Postal voting and electoral fraud 2001-09, download from https://commonslibrary.parliament.uk/research-briefings/sn03667/ ConferenceGoogle ScholarGoogle Scholar

Index Terms

  1. Recommendation CM/REC(2017)5 of the Council of Europe and an Analysis of eVoting Protocols

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days
      September 2022
      192 pages
      ISBN:9781450397667
      DOI:10.1145/3551504

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format