Secure and Practical Online Elections via Voting Service Provider
نویسندگان
چکیده
Our paper deals with the question how remote e-voting can be put into practice in a secure and at the same time feasible way. We show that outsourcing the technical implementation of electronic elections to a Voting Service Provider (VSP) is one solution to this problem. Our concept can help election hosts to easily conduct electronic elections without having to take care of the necessary security precautions. Thus the election hosts can profit from the advantages of electronic elections with little effort. Thereby our concept may improve the cost-benefit balance of e-voting. Current remote e-voting schemes aim at a number of security objectives, e.g. anonymity, democracy or accuracy. However, this is not enough for providing secure online elections in practice. Beyond a secure e-voting protocol, there are many organizational and technical security requirements that have to be satisfied by the operational environment in which the scheme is implemented. For example, secure storage of key material, a Public Key Infrastructure or the secure delivery of voting equipment are often required but cannot be provided by the protocols themselves. We have investigated four state-of-the-art e-voting protocols in order to identify the organizational and technical requirements which these protocols need to be met in order to work correctly. Satisfying these requirements is a costly task which reduces the potential advantages of e-voting considerably. We introduce the concept of a VSP which carries out electronic elections as a trusted third party and is responsible for satisfying the organizational and technical requirements. We show which measures the VSP takes to meet these requirements. To establish trust in the VSP we propose a Common Criteria evaluation and a legal framework. Following this approach, we show that the VSP enables secure, cost-effective, and thus feasible online elections.
منابع مشابه
Secure Online Elections in Practice
Current remote e-voting schemes aim at a number of security objectives. However, this is not enough for providing secure online elections in practice. Beyond a secure e-voting protocol, there are many organizational and technical security requirements that have to be satisfied by the operational environment in which the scheme is implemented. We have investigated four state-of-the-art e-voting ...
متن کاملTowards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has never been put together in a single protocol before. Among all electronic voting schemes in the literature, Sensus, a security-conscious electronic voting protocol proposed by Cranor and Cytron [CC97], satisfies the most o...
متن کاملTowards secure online elections: models, primitives and open issues
Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be able to cast their votes through a web browser, from their home or any other location where they can get Internet access. This paper reviews the generic cryptographic models that have been proposed in the academic liter...
متن کاملPretty Good Voting
Recent academic assessments of the potential for secure Internet-based voting have been extremely pessimistic. A panel assembled to review the Department of Defense’s SERVE (Secure Electronic Registration and Voting Experiment) project– a system designed to allow foreign-based members of the armed services to vote online in Federal elections, which was nearly deployed for the 2004 election–conc...
متن کاملPractical Remote Electronic Elections for the UK
The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing REV schemes employ some form of cryptography, either to secure transmission of votes, or to model some desirable feature of public elections. This paper outlines the limitations of employing cryptographic REV schemes and proposes ...
متن کامل