Survey on Remote Electronic Voting

Electronic and remote voting has become a large field of research and brought forth a multiplicity of schemes, systems, cryptographic primitives as well as formal definitions and requirements for electronic elections. In this survey we try to give a brief and precise overview and summary of the current situation.

[1]  Chih-Cheng Chen,et al.  A Secure Anonymous E-Voting System based on Discrete Logarithm Problem , 2014 .

[2]  Helger Lipmaa Secure Electronic Voting Protocols , 2005 .

[3]  Aggelos Kiayias,et al.  The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.

[4]  Josh Benaloh Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.

[5]  Victor K.-W. Wei,et al.  Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation , 2005, ISPEC.

[6]  Jörg Schwenk,et al.  Code Voting with Linkable Group Signatures , 2008, Electronic Voting.

[7]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[8]  Jörn Müller-Quade,et al.  Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.

[9]  Josef Kittler,et al.  Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.

[10]  Michael R. Clarkson,et al.  Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[11]  Peter Y. A. Ryan,et al.  Caveat Coercitor: Coercion-Evidence in Electronic Voting , 2013, 2013 IEEE Symposium on Security and Privacy.

[12]  C. Andrew Neff,et al.  A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.

[13]  Pascal Lafourcade,et al.  Survey on Electronic Voting Schemes , 2010 .

[14]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[15]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[16]  Ida Sofie Gebhardt Stenerud,et al.  When Reality Comes Knocking Norwegian Experiences with Verifiable Electronic Voting , 2012, Electronic Voting.

[17]  Ülle Madise,et al.  E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.

[18]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[19]  Urs Gasser,et al.  Three Case Studies from Switzerland : E-Voting , 2009 .

[20]  Rolf Haenni,et al.  Achieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting , 2012, Electronic Voting.

[21]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[22]  Eric Wustrow,et al.  Attacking the Washington, D.C. Internet Voting System , 2012, Financial Cryptography.

[23]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.