Attacking Paper-Based E2E Voting Systems
نویسندگان
چکیده
In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter , and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.
منابع مشابه
End-to-End Cryptography: Spreading Democracy
Due to concerns related to the security and privacy of conventional and electronic voting systems as well as the shortcomings of some verification methods, such as Voter Verified Paper Audit Trails (VVPATs), an alternative approach known as End-to-End (E2E) voter verifiable system was proposed. E2E systems rely on cryptography to provide voters and the public with both secrecy and accuracy, two...
متن کاملAn Overview of End-to-End Verifiable Voting Systems
Advances in E2E verifiable voting have the potential to fundamentally restore trust in elections and democratic processes in society. In this chapter, we provide a comprehensive introduction to the field. We trace the evolution of privacy and verifiability properties in the research literature and describe the operations of current state-of-the-art E2E voting systems. We also discuss outstandin...
متن کاملEvery Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting
This paper presents a new End-to-End (E2E) verifiable e-voting protocol for large-scale elections, called Direct Recording Electronic with Integrity (DRE-i). In contrast to all other E2E verifiable voting schemes, ours does not involve any Tallying Authorities (TAs). The design of DRE-i is based on the hypothesis that existing E2E voting protocols’ universal dependence on TAs is a key obstacle ...
متن کاملCombining End-To-End Voting With Trustworthy Computing for Greater Privacy, Trust, Accessibility, and Usability (summary)
We advocate combining Trustworthy Computing (TC) techniques—including Trusted Platform Module (TPM) protocols, application attestation, and reduced software footprints—with end-toend (E2E) technologies, to provide voter and universal verifiability while enhancing privacy, accessibility, and usability through trustworthy electronic systems. Current voting approaches with paper, electronic, and e...
متن کاملA framework for secure electronic voting
We describes a framework in which to view the end-to-endindependently-verifiable (E2E) voting systems based on mixnets. We use the framework to invent new systems that combine front and back-ends from existing systems.
متن کامل