Electronic voting with Scantegrity: analysis and exposing a vulnerability

نویسنده

  • John S. Dean
چکیده

This paper describes Scantegrity, an electronic voting system developed by Chaum et al. (2008b), and it analyses Scantegrity’s ability to satisfy the goals of privacy and verifiability. The paper describes a programmatic attack on Scantegrity and presents findings in the form of program output for a corrupted hypothetical election. The attack takes advantage of the inherent vulnerability of electronic voting systems due to the tension between the goals of privacy and verifiability. It exposes a security weakness in electronic voting systems, and it establishes the need to control code compilation and provide physical security for that compiled code throughout the election process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Scantegrity, an Electronic Voting System

Electronic voting machines are becoming an increasingly popular alternative to paper ballots. With this increase in use we must analyze how well these machines adhere to voting requirements, including those relating to security, privacy, and anonymity. This paper includes analysis of the security and auditing mechanisms of the open-source electronic voting system Scantegrity. We focus on Scante...

متن کامل

Scantegrity Mock Election at Takoma Park

We report on our experiences and lessons learned using Scantegrity II in a mock election held April 11, 2009, in Takoma Park, Maryland. Ninety-five members of the community participated in our test of this voting system proposed for the November 2009 municipal election. Results helped improve the system for the November binding election.

متن کامل

eTegrity and ePunchScan

We examine the problem of an electronic end-to-end voting system that does not require paper. As a frst step, we defne two protocols based on the end-to-end protocols of Scantegrity and PunchScan respectively. Using either protocol, the voter votes on an electronic voting machine in a polling booth. We also assume the voter may bring with him a (personally trusted) voter computing device that a...

متن کامل

Proving Coercion-Resistance of Scantegrity II

Recently, Küsters, Truderung, and Vogt have proposed a simple, yet widely applicable and formal definition of coercion-resistance for voting protocols, which allows to precisely quantify the level of coercion-resistance a protocol provides. In this paper, we use their definition to analyze coercion-resistance of Scantegrity II, one of the most prominent voting systems used in practice. We show ...

متن کامل

Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability

Building on lessons learned from the November 2009 Scantegrity II election in Takoma Park, MD, we propose improvements to the Scantegrity II voting system that (1) automatically print trustworthy receipts for easier on-line verification, (2) highlight ballot features including over/under votes to comply with the Help America Vote Act, and (3) achieve full voter verifiability by eliminating prin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EG

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2012