Independent Computations for Safe Remote Electronic Voting

In a world where a high percentage of citizens carry a smart phone or iPod and most households have one or more computers, it is difficult to understand why we have not been able to leverage powerful personal computing devices to allow citizens to cast their ballots electronically. The argument turns on security weakness in all kinds of network computing and on theoretical limits on the ability to protect critical applications.

[1]  D. Jefferson,et al.  Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .

[2]  Ralf Küsters,et al.  An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[3]  Michael J. Fischer,et al.  A robust and verifiable cryptographically secure election scheme , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[4]  Markus Jakobsson,et al.  Towards Trustworthy Elections, New Directions in Electronic Voting , 2010, Towards Trustworthy Elections.

[5]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[6]  Alec Yasinsac,et al.  The Dynamics of Counting and Recounting Votes , 2008, IEEE Security & Privacy.

[7]  Mark Ryan,et al.  Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[8]  Ronald L. Rivest,et al.  A Modular Voting Architecture ("Frog Voting") , 2010, Towards Trustworthy Elections.

[9]  Yvo Desmedt,et al.  Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.

[10]  Elaine Shi,et al.  BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[11]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[12]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[13]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[14]  Bart Preneel,et al.  Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .

[15]  Kazue Sako,et al.  Secure Voting Using Partially Compatible Homomorphisms , 1994, CRYPTO.

[16]  Jonathan K. Millen,et al.  Principles of remote attestation , 2011, International Journal of Information Security.

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[19]  Michael R. Clarkson,et al.  Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[20]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.