The Community for Technology Leaders
RSS Icon
Issue No.05 - Sept.-Oct. (2012 vol.10)
pp: 25-32
Richard Buckland , University of New South Wales
Roland Wen , University of New South Wales
Australia has a long history of transparent, high-integrity secret ballot elections. As elections are increasingly dependent on electronic systems, the traditions of transparency and privacy must extend to new technologies and ways of scrutinizing them. The Victorian Electoral Commission (VEC) is undertaking a project that aims to set the bar for how Australian e-voting systems should be commissioned, developed, and scrutinized. Through collaboration with the Universities of New South Wales, Melbourne, Luxembourg, and Surrey, the VEC is developing the first state government–level universally verifiable public e-voting system in the world, based on Prêt à Voter.
Nominations and elections, Electronic voting, Australia, Cryptography, Privacy, Observers, transparency, e-voting, Australia, elections, preferential voting, security
Richard Buckland, Roland Wen, "The Future of E-voting in Australia", IEEE Security & Privacy, vol.10, no. 5, pp. 25-32, Sept.-Oct. 2012, doi:10.1109/MSP.2012.59
1. D. Chaum, P.Y.A. Ryan, and S.A. Schneider, “A Practical Voter-Verifiable Election Scheme,” Proc. 10th European Symp. Research in Computer Security (ESORICS 05), LNCS 3679, Springer, 2005, pp. 118–139.
2. Report to Parliament on the 2010 Victorian State Election, Victorian Electoral Commission, 2011.
3. “International Movements—2011–12, Australian Bureau of Statistics,” 2012; 961B6B53B87C130ACA2574030010BD05?OpenDocument .
4. R. Buckland, V. Teague, and R. Wen, “Towards Best Practice for E-election Systems: Lessons from Trial and Error in Australian Elections,” VOTE-ID 2011, LNCS 7187, Springer, 2012, pp. 224–241.
5. R.L. Rivest, “On the Notion of 'Software Independence' in Voting Systems,” Philosophical Trans. Royal Soc. A: Mathematical, Physical and Eng. Sciences, vol. 366, no. 1881, 2008, pp. 3759–3767.
6. B. Adida, “Helios: Web-Based Open-Audit Voting,” Proc. 17th Usenix Security Symp., Usenix Assoc., 2008, pp. 335–348.
7. M.R. Clarkson, S. Chong, and A.C. Myers, “Civitas: Toward a Secure Voting System,” Proc. IEEE Symp. Security and Privacy (SP 08), IEEE CS, 2008, pp. 354–368.
8. “Yarran v. Blurton,” Australian Law Reports, vol. 107, 1992, p. 514.
9. R. Di Cosmo, On Privacy and Anonymity in Electronic and Non Electronic Voting: The Ballot-as-Signature Attack, 2007, HAL Open Archive: hal-00142440.
10. J. Benaloh et al., “Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting,” IEEE Trans. Information Forensics and Security, vol. 4, no. 4, 2009, pp. 685–698.
11. J. Goh and P. Golle, “Event Driven Private Counters,” LNCS 3570, Springer, 2005, pp. 313–327.
12. J. Heather, “Implementing STV Securely in Prêt à Voter,” Proc. 20th IEEE Computer Security Foundations Symp. (CSF 07), IEEE CS, 2007, pp. 157–169.
13. V. Teague, K. Ramchen, and L. Naish, “Coercion-Resistant Tallying for STV Voting,” Proc. Conf. Electronic Voting Technology (EVT 08), Usenix Assoc., 2008, article 15.
14. R. Wen and R. Buckland, “Minimum Disclosure Counting for the Alternative Vote,” LNCS 5767, Springer, 2009, pp. 122–140.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool