Attacking Paper-Based E2E Voting Systems

نویسندگان

  • John Kelsey
  • Andrew Regenscheid
  • Tal Moran
  • David Chaum
چکیده

In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter , and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-End Cryptography: Spreading Democracy

Due to concerns related to the security and privacy of conventional and electronic voting systems as well as the shortcomings of some verification methods, such as Voter Verified Paper Audit Trails (VVPATs), an alternative approach known as End-to-End (E2E) voter verifiable system was proposed. E2E systems rely on cryptography to provide voters and the public with both secrecy and accuracy, two...

متن کامل

An Overview of End-to-End Verifiable Voting Systems

Advances in E2E verifiable voting have the potential to fundamentally restore trust in elections and democratic processes in society. In this chapter, we provide a comprehensive introduction to the field. We trace the evolution of privacy and verifiability properties in the research literature and describe the operations of current state-of-the-art E2E voting systems. We also discuss outstandin...

متن کامل

Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting

This paper presents a new End-to-End (E2E) verifiable e-voting protocol for large-scale elections, called Direct Recording Electronic with Integrity (DRE-i). In contrast to all other E2E verifiable voting schemes, ours does not involve any Tallying Authorities (TAs). The design of DRE-i is based on the hypothesis that existing E2E voting protocols’ universal dependence on TAs is a key obstacle ...

متن کامل

Combining End-To-End Voting With Trustworthy Computing for Greater Privacy, Trust, Accessibility, and Usability (summary)

We advocate combining Trustworthy Computing (TC) techniques—including Trusted Platform Module (TPM) protocols, application attestation, and reduced software footprints—with end-toend (E2E) technologies, to provide voter and universal verifiability while enhancing privacy, accessibility, and usability through trustworthy electronic systems. Current voting approaches with paper, electronic, and e...

متن کامل

A framework for secure electronic voting

We describes a framework in which to view the end-to-endindependently-verifiable (E2E) voting systems based on mixnets. We use the framework to invent new systems that combine front and back-ends from existing systems.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010