Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)

Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election and it is not an easy task due to the need of achieving electronic voting security requirements. The cryptographic voting protocols use advanced cryptography to make electronic voting secure and applicable. In this paper, formal definitions of security requirements for cryptographic voting protocols (privacy, eligibility, uniqueness, fairness, uncoercibility, receipt-freeness, accuracy, and individual verifiability) are provided, and elaborate checklists for each requirement are presented. The voting problem is clearly defined in terms of security requirements. The voting problem arises from the trade-off between receipt-freeness and individual verifiability. This paper suggests the Predefined Fake Vote (PreFote) scheme as an applicable solution to overcome the voting problem. The PreFote scheme is not a voting protocol; however, it is a building block that can be used by any voting protocol.

[1]  Guido Schryen Security aspects of Internet voting , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[2]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[3]  John Paul Gibson,et al.  Electronic Voting: A Safety Critical System , 2003 .

[4]  Safevote Voting System Requirements , .

[5]  Patricia Heindl E-Voting in Austria Legal requirements and First Steps , 2004, Electronic Voting in Europe.

[6]  Radha Poovendran,et al.  A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..

[7]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[8]  Byoungcheon Lee,et al.  Implementation Issues in Secure E-Voting Schemes , 2004 .

[9]  Josh Benaloh,et al.  Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.

[10]  Lorrie Faith Cranor,et al.  Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[11]  Deniz Cetinkaya,et al.  Towards Secure E-Elections in Turkey: Requirements and Principles , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[12]  France T́elécom,et al.  Verifying Properties of Electronic Voting Protocols , 2006 .

[13]  Emmanouil Magkos,et al.  Towards Secure and Practical E-Elections in the New Era , 2003, Secure Electronic Voting.

[14]  Lilian Mitrou,et al.  Revisiting Legal and Regulatory Requirements for Secure E-Voting , 2002, SEC.