Towards Trustworthy Online Voting

نویسندگان

  • Ammar Alkassar
  • Ahmad-Reza Sadeghi
  • Stefan Schulz
  • Melanie Volkamer
چکیده

An increasing number of elections have been performed using Online Voting. Due to these experiences, the technical research topics have changed: While voting protocols have been well analysed in the past, now, the security and trustworthiness of the client platforms come to the fore. Malware could cause arbitrary damages regardless how secure the underlying voting scheme is. Moreover, corrupt voters can overcome the receipt-freeness of many protocols by manipulating their voting client (PC). Currently, the client side is mainly protected by organizational measures imposed on the voters, largely ignoring the issue of corrupt voters. However, since elections are the very basis of democracy, verifiable technical solutions are essential. Therefore, we examine the necessary properties of a trustworthy client which both protect the voters from malware and the voting system from corrupt voters. Our approach is based on Trusted Computing in combination with a secure operating system. We show that other existing voting protocols can be implemented on the top of our approach as well as a significantly simplified voting scheme by still retaining the required properties.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards trustworthy e-voting using paper receipts

Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proofs or confirming evidences of their honesty. This lack of trustworthiness is the main reason why e-voting is not widely spread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that t...

متن کامل

Scratch, Click & Vote: E2E Voting over the Internet

We present Scratch, Click & Vote remote voting scheme. The scheme is end-to-end verifiable and allows for voting over the Internet. It guarantees security against malicious hardware and software used by a voter; a voter’s computer does not get any knowledge about the voter’s choice. Moreover, it can blindly change the voter’s ballot with a small probability only.

متن کامل

Anonymity in Voting Revisited

According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymit...

متن کامل

Enabling the Application of Open Systems like PCs for Online Voting

An increasing number of elections have been performed using Online Voting. Due to these experiences, the technical research topics have changed: While voting protocols have been well analysed in the past, now, the security and trustworthiness of the client platforms come to the fore. Malware could cause arbitrary damages regardless how secure the underlying voting scheme is. Moreover, corrupt v...

متن کامل

Helios: Web-based Open-Audit Voting

Voting with cryptographic auditing, sometimes called open-audit voting, has remained, for the most part, a theoretical endeavor. In spite of dozens of fascinating protocols and recent ground-breaking advances in the field, there exist only a handful of specialized implementations that few people have experienced directly. As a result, the benefits of cryptographically audited elections have rem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006