This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Three-Ballot-Based Secure Electronic Voting System
May/June 2008 (vol. 6 no. 3)
pp. 14-21
Altair O. Santin, Pontifical Catholic University of Paran? State
Regivaldo G. Costa, Brazilian Parliament
Carlos A. Maziero, Pontifical Catholic University of Paran? State
This article presents a secure electronic voting system integrated in a single architecture—one that addresses vote receipts, uniqueness and materialization of the vote, and voter privacy and anonymity. Our prototype, built using Web services and Election Markup Language, shows the proposal's viability.

1. M. Byrne, K. Greene, and S. Everett, "Usability of Voting Systems: Baseline Data for Paper, Punch Cards, and Lever Machines," CHI 2007 Proc., Politics &Activism, ACM Press, vol. 1, 1997, pp. 171–180.
2. M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology, Eurocrypt 94, Springer, vol. 950, 1995, pp. 1–12.
3. J. Benaloh and D. Tuinstra, "Receipt-Free Secret-Ballot Elections," Proc. 26th Ann. ACM Symp. Theory of Computing, 1994, ACM Press, pp. 544–553.
4. D. Chaum, "Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, 1981, pp. 84–88.
5. B. Schneier, Applied Cryptography, 2nd ed., John Wiley &Sons, 1996, pp. 125–133.
6. Oasis, "The Case for Using Election Markup Language (EML)," white paper, Oasis Election and Voter Services TC, 2007; www.oasis-open.org/committeeselection.
7. R. Mercuri, Electronic Vote Tabulation Checks and Balances, doctoral dissertation, Dept. of Computer and Information Systems, Univ. of Pennsylvania, 2001.
8. P. Neumann, "Security Criteria for Electronic Voting," Proc. 16th Nat'l Computer Security Conf., US Nat'l Inst. of Standards and Technology; www.csl.sri.com/users/neumannncs93.html.
9. R. Rivest and W. Smith, "Three Voting Protocols: ThreeBallot, VAV, and Twin," Usenix/Accurate Electronic Voting Technology Workshop, 16th Usenix Security Symp., 2007; http://people.csail.mit.edu/rivestRivestSmith-ThreeVotingProtocolsThreeBallotVAVAndTwin.pdf .
10. D. Chaum, "Blind Signatures for Untraceable Payments," Advances in Cryptology (Crypto 82), Plenum, 1982, pp. 199–204.
11. A. Fujioka, T. Okamoto, and K. Ohta, "A Practical Secret Voting Scheme for Large-Scale Elections," Advances in Cryptology (Auscrypt 92), LNCS, vol. 718, 1993, pp. 244–251.
12. L. Norden, "The Machinery of Democracy: Voting System Security, Accessibility, Usability, and Cost," Brennan Report, The Brennan Center for Justice, 2006.
13. D. Jefferson et al., "Analyzing Internet Voting Security," Comm. ACM, vol. 47, no. 10, 2004, pp. 59–64.

Index Terms:
electronic voting system, e-voting, cryptography-based security, three-ballot voting system, cryptography.
Citation:
Altair O. Santin, Regivaldo G. Costa, Carlos A. Maziero, "A Three-Ballot-Based Secure Electronic Voting System," IEEE Security & Privacy, vol. 6, no. 3, pp. 14-21, May-June 2008, doi:10.1109/MSP.2008.56
Usage of this product signifies your acceptance of the Terms of Use.