Secure Electronic Voting

Contributing Authors. Preface. Part I: Setting the Scene. 1. Evaluation of voting technologies D. Jones. 2. In search of the perfect voting technology: No easy answers L.F. Cranor. 3. Verification for electronic balloting systems R. Mercuri, P. Neumann. 4. Electronic voting: Constitutional and legal requirements, and their technical implications L. Mitrou, D. Gritzalis, S. Katsikas, G. Quirchmayr. Part II: Trends and Perspectives. 5. Towards secure and practical e-elections in the new era M. Burmester, E. Magkos. 6. The theory and implementation of electronic voting systems I. Damgard, J. Groth, G. Salomonsen. 7. Secure electronic voting: The current landscape C. Lambrinoudakis, D. Gritzalis, V. Tsoumas, M. Karyda, S. Ikonomopoulos. Part III: Capabilities and Limitations. 8. Public confidence and auditability in voting systems R. Saltman. 9. Robust verifiable non-interactive zero-sharing: A plug-in utility for enhanced voters' privacy A. Kiayias, M. Yung. 10. Issues, non-issues, and cryptographic tools for Internet-based voting R. Peralta. 11. Private, secure and auditable Internet voting E. Gerck. 12. Remote voting via the Internet? The Canton of Geneva pilot project A. Trechsel, F. Mendez, R. Kies. 13. e-vote and PKI's: A need, a bliss, or a curse? D. Bruschi, G. Poletti, E. Rosti. 14. Untraceable electronic mail, return addresses, and digital pseudonyms D. Chaum. Index.

[1]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[2]  S. Tefft Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide , 2002 .

[3]  Michael J. Radwin An untraceable , universally verifiable voting scheme , 1997 .

[4]  Kaoru Kurosawa,et al.  Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.

[5]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[6]  Kazue Sako,et al.  Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.

[7]  Fabrice Boudot,et al.  Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.

[8]  Lila Kari,et al.  Secret ballot elections in computer networks , 1991, Computers & security.

[9]  Lam Berry Schoenmakers,et al.  Fully auditable electronic secret-ballot elections , 2000 .

[10]  Jie Wang,et al.  Towards a practical, secure, and very large scale online election , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[11]  C. Andrew Neff,et al.  A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.

[12]  Berry Schoenmakers Compensating for a lack of transparency , 2000, CFP '00.

[13]  R. Gibson,et al.  Elections Online: Assessing Internet Voting in Light of the Arizona Democratic Primary , 2001 .

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.