The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2008 vol.6)
pp: 14-21
Altair O. Santin , Pontifical Catholic University of Paran? State
Regivaldo G. Costa , Brazilian Parliament
Carlos A. Maziero , Pontifical Catholic University of Paran? State
ABSTRACT
This article presents a secure electronic voting system integrated in a single architecture—one that addresses vote receipts, uniqueness and materialization of the vote, and voter privacy and anonymity. Our prototype, built using Web services and Election Markup Language, shows the proposal's viability.
INDEX TERMS
electronic voting system, e-voting, cryptography-based security, three-ballot voting system, cryptography.
CITATION
Altair O. Santin, Regivaldo G. Costa, Carlos A. Maziero, "A Three-Ballot-Based Secure Electronic Voting System", IEEE Security & Privacy, vol.6, no. 3, pp. 14-21, May/June 2008, doi:10.1109/MSP.2008.56
REFERENCES
1. M. Byrne, K. Greene, and S. Everett, "Usability of Voting Systems: Baseline Data for Paper, Punch Cards, and Lever Machines," CHI 2007 Proc., Politics &Activism, ACM Press, vol. 1, 1997, pp. 171–180.
2. M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology, Eurocrypt 94, Springer, vol. 950, 1995, pp. 1–12.
3. J. Benaloh and D. Tuinstra, "Receipt-Free Secret-Ballot Elections," Proc. 26th Ann. ACM Symp. Theory of Computing, 1994, ACM Press, pp. 544–553.
4. D. Chaum, "Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, 1981, pp. 84–88.
5. B. Schneier, Applied Cryptography, 2nd ed., John Wiley &Sons, 1996, pp. 125–133.
6. Oasis, "The Case for Using Election Markup Language (EML)," white paper, Oasis Election and Voter Services TC, 2007; www.oasis-open.org/committeeselection.
7. R. Mercuri, Electronic Vote Tabulation Checks and Balances, doctoral dissertation, Dept. of Computer and Information Systems, Univ. of Pennsylvania, 2001.
8. P. Neumann, "Security Criteria for Electronic Voting," Proc. 16th Nat'l Computer Security Conf., US Nat'l Inst. of Standards and Technology; www.csl.sri.com/users/neumannncs93.html.
9. R. Rivest and W. Smith, "Three Voting Protocols: ThreeBallot, VAV, and Twin," Usenix/Accurate Electronic Voting Technology Workshop, 16th Usenix Security Symp., 2007; http://people.csail.mit.edu/rivestRivestSmith-ThreeVotingProtocolsThreeBallotVAVAndTwin.pdf .
10. D. Chaum, "Blind Signatures for Untraceable Payments," Advances in Cryptology (Crypto 82), Plenum, 1982, pp. 199–204.
11. A. Fujioka, T. Okamoto, and K. Ohta, "A Practical Secret Voting Scheme for Large-Scale Elections," Advances in Cryptology (Auscrypt 92), LNCS, vol. 718, 1993, pp. 244–251.
12. L. Norden, "The Machinery of Democracy: Voting System Security, Accessibility, Usability, and Cost," Brennan Report, The Brennan Center for Justice, 2006.
13. D. Jefferson et al., "Analyzing Internet Voting Security," Comm. ACM, vol. 47, no. 10, 2004, pp. 59–64.
13 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool