New voter verification scheme using pre-encrypted ballots

In order for remote electronic voting systems to be reliable, voter verification is an essential feature. Most pre-encrypted ballot schemes proposed to date allow voters to verify that their votes have been properly recorded in the voting server. Such verification makes it possible to detect manipulation of the vote in the voting terminal or during its transmission. However, these schemes do not allow voters to verify that their votes have been accurately included in the counting process. In this paper, we describe a new proposal that solves this problem. Under the proposed scheme, voters can verify that their votes have been properly recorded, and they also have the opportunity to individually verify that their votes have been properly included in the counting process. Voter verification is thus achieved in two different contexts: proper recording and accurate counting.

[1]  Jörg Schwenk,et al.  Secure Internet Voting with Code Sheets , 2007, VOTE-ID.

[2]  R. Oppliger How to address the secure platform problem for remote internet voting , 2002 .

[3]  Jordi Puiggalia,et al.  INDEPENDENT VOTER VERIFIABILITY FOR REMOTE ELECTRONIC VOTING , 2007 .

[4]  Kazue Sako Electronic Voting Scheme Allowing Open Objection to the Tally , 1994 .

[5]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[6]  Josep Rifà,et al.  An implementable secure voting scheme , 1996, Comput. Secur..

[7]  Frank Zimmermann,et al.  Anonymous Code Lists for Secure Electronic Voting over Insecure Mobile Channels , 2008 .

[8]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[9]  Tim Storer,et al.  Polsterless Remote Electronic Voting , 2004 .

[10]  Tim Storer,et al.  Two variations to the mCESG pollsterless e-voting scheme , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).

[11]  Joan Borrell,et al.  Efficient construction of vote-tags to allow open objection to the tally in electronic elections , 2000, Inf. Process. Lett..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Gustavus J. Simmons,et al.  A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.

[14]  Jordi Puiggali,et al.  Independent Voter Verifiability for Remote Electronic Voting , 2007, SECRYPT.

[15]  Carlos Ribeiro,et al.  CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment , 2007, VOTE-ID.

[16]  Tim Storer,et al.  Practical Remote Electronic Elections for the UK , 2004, PST.

[17]  Dahlia Malkhi,et al.  E-Voting Without 'Cryptography' , 2002, Financial Cryptography.

[18]  Tim Storer,et al.  An Exploratory Study of Voter attitudes towards a Pollsterless Remote Voting System , 2006 .

[19]  Lorrie Faith Cranor,et al.  Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[20]  L. Cranor,et al.  Security Considerations for Remote Electronic Voting over the Internet , 2002 .