Vote verification through open standard: A roadmap

As the technology for e-voting changes day by day along with an evolution of the regulatory environment, many questions emerge. One of these questions is how to allow voters or any third party to verify votes are correctly captured, stored and counted. This underlines the fact that an e-voting system is not only responsible for ensuring its technical and procedural security, but also must provide a mechanism by which voters can verify their votes during and after casting, and third party be able to verify the correctness and integrity of election results. The purpose of this paper is to review currently deployed vote verification methods, by discuss their weaknesses with the aim of proposing a more reliable and robust vote verification method.

[1]  Alec Yasinsac,et al.  The Dynamics of Counting and Recounting Votes , 2008, IEEE Security & Privacy.

[2]  Zhe Xia,et al.  Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption , 2008, EVT.

[3]  Giovanni Vigna,et al.  An Experience in Testing the Security of Real-World Electronic Voting Systems , 2010, IEEE Transactions on Software Engineering.

[4]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[5]  Alan T. Sherman,et al.  An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study , 2006, EVT.

[6]  Jeremy Clark,et al.  Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes , 2009, IEEE Transactions on Information Forensics and Security.

[7]  Wolter Pieters,et al.  Anonymity and Verifiability in Voting: Understanding (Un)Linkability , 2010, ICICS.

[8]  Zhe Xia,et al.  PrÊt À Voter: a Voter-Verifiable Voting System , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Rebecca T. Mercuri,et al.  Electronic vote tabulation checks and balances , 2001 .

[10]  Wolter Pieters,et al.  Acceptance of Voting Technology: Between Confidence and Trust , 2006, iTrust.

[11]  C. Andrew Ne,et al.  Practical high certainty intent verification for encrypted votes , 2004 .

[12]  Alan T. Sherman,et al.  A Study of Vote Verification Technologies Part I : Technical Study , 2006 .

[13]  Giovanni Vigna,et al.  EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing , 2007 .

[14]  Jeremy Clark,et al.  Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.

[15]  Wolter Pieters,et al.  What proof do we prefer? Variants of verifiability in voting , 2006 .

[16]  Ted Selker,et al.  An Active Approach to Voting Verification , 2005 .

[17]  Peter Y. A. Ryan,et al.  Computing Science Pret a Voter with Paillier Encryption Pret a Voter with Paillier Encryption Bibliographical Details Pret a Voter with Paillier Encryption Suggested Keywords Prêtà Voter with Paillier Encryption , 2007 .

[18]  Ralf Küsters,et al.  Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study , 2011, 2011 IEEE Symposium on Security and Privacy.