Towards Trustworthy Elections: New Directions in Electronic VotingDavid Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields. |
Contents
The WitnessVoting System | 1 |
CoercionResistant Electronic Elections | 37 |
ReceiptFree KoutofL Voting Based on ElGamal Encryption | 64 |
A Secure Architecture for Voting Electronically SAVE | 83 |
A Modular Voting Architecture Frog Voting | 97 |
Unconditionally Secure Electronic Voting | 107 |
A Balancing Act | 124 |
An Implementation of a MixNet Based Network Voting Scheme and Its Use in a Private Organization | 141 |
Anonymous OneTime Broadcast Using Noninteractive Dining Cryptographer Nets with Applications to Voting | 231 |
An Introduction to PunchScan | 242 |
Component Based Electronic Voting Systems | 260 |
A Verifiable Voting Protocol Based on Farnel | 274 |
A Taster | 289 |
Improving Remote Voting Security with CodeVoting | 310 |
A Practical and Secure CoercionResistant Scheme for Internet Voting | 330 |
E2E Voting over the Internet | 343 |
The VectorBallot Approach for Online Voting Procedures | 155 |
On Optical MarkSense Scanning | 175 |
On Some Incompatible Properties of Voting Schemes | 191 |
A Threat Analysis of Prˆet a Voter | 200 |
Anonymity in Voting Revisited | 216 |
Securing OpticalScan Voting | 357 |
Attacking PaperBased E2E Voting Systems | 370 |
High Integrity Elections for Developing Countries | 388 |
402 | |
Other editions - View all
Common terms and phrases
adversary allow anonymity attack audit ballot box ballot columns ballot form blind signatures bulletin board candidate channel Chaum choice ciphertexts CodeCard CodeVoting coercer coercion coercion-resistance commitment scheme component counted credential CRYPTO cryptographic voting decryption defined device digital signature e-voting efficient election authority election outcome electronic voting electronic voting system EUROCRYPT example Heidelberg homomorphic encryption implementation input Internet layer LNCS mark modules output paper ballots permutation phase plaintext polling polynomial Prêt à Voter private key properties proposed prove public key Punchboard Punchscan random re-encryption receipt receipt-freeness registration require scanner Section semantic security serial number sheet Springer tallying authorities ThreeBallot trust Trustworthy Elections universal verifiability vector ballot verifiable secret sharing vote buying vote casting vote code voter privacy voter-verifiable voting machines voting process voting protocol voting scheme voting system VVPAT write-in