Skip to main content

Secure Electronic Voting: the Current Landscape

  • Chapter

Part of the book series: Advances in Information Security ((ADIS,volume 7))

Abstract

This paper presents the security requirements and the system wide properties that the voting protocol of an electronic voting system is expected to fulfil. Then, an overview of the existing voting protocols, together with a brief analysis of their characteristics, is provided. The aim is to investigate and discuss the extent to which current voting protocols comply with the identified requirements and thus examine the feasibility of organising and conducting an Internet based election in a secure, efficient and reliable way.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benaloh J., “Verifiable secret-ballot elections”, Ph.D. Dissertation, Yale University, YALEU/CDS/TR-561, December 1987.

    Google Scholar 

  2. Baudron O., Fouque P., Pointcheval D., Poupard G., “Practical multi-candidate election system”, in Proc. of the 20 th ACM Symposium on Principles of Distributed Computing, August 2001, USA, pg. 274–283, ACM Press.

    Google Scholar 

  3. Baraani A., Pieprzyk J., Safavi R., “A Practical electronic voting protocol using threshold schemes”, Centre for Computer Security Research, Dept. of Computer Science, University of Wollongong, Australia, May 1994.

    Google Scholar 

  4. Benaloh J., Tuinstra D., “Receipt-free secret-ballot elections”, Clarkson University, 1994.

    Google Scholar 

  5. Benaloh J., Yung M., “Distributing the power of a Government to enhance the privacy of votes”, in Proc. of the 5th ACM Symposium on Principles of Distributed Computing, pg. 52–62, August 1986.

    Google Scholar 

  6. Cohen J., Fischer M., “A robust and verifiable cryptographically secure election scheme”, in 26th Annual Symposium on Foundations of Computer Science, IEEE Press, pg. 372–382, October 1985.

    Google Scholar 

  7. Cramer R., Franklin M., Schöenmakers B., Yung M., “Multi-authority secret-ballot elections with linear work”, in Advances in Cryptology — EUROCRYPT’95, LNCS 1070, pg. 72–83, Springer-Verlag, May 1996.

    Google Scholar 

  8. Cramer R., Gennaro R., Schöenmakers B., “A secure and optimally efficient multi-authority election scheme”, in Proc. of EUROCRYPT’97, Germany, Springer-Verlag, LNCS 1233, pg. 103–118.

    Google Scholar 

  9. Damgård I., Jurik M., “Efficient protocols based on probabilistic encryption using composite degree residue classes”, RS-00–5, Dept. of Computer Science, University of Aarhus, March 2000.

    Google Scholar 

  10. Damgård I., Jurik M., “A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system”, in Proc. of the Fourth International Workshop on Practice and Theory in Public Key Cryptography,LNCS 1992, 2001, pg. 119–136.

    Google Scholar 

  11. Fujioka A., Okamoto T., Ohta K., “A practical secret voting scheme for large-scale elections”, in Advances in Cryptology, Proceedings of AUSCRYPT’92, LNCS 718, pg. 244–251, Springer-Verlag, 1992.

    Google Scholar 

  12. Hirt M., Sako K., “Efficient receipt-free voting based on homomorphic encryption”, Theory and Application of Cryptographic Techniques, pg. 539–556, 2000.

    Google Scholar 

  13. Kiong N., “Electronic election”, Proceedings of ITSim 2000.

    Google Scholar 

  14. Karro J., Wang J., “Towards a practical, secure and very large-scale online election”, in Proc. of the 15th Annual Computer Security Applications Conference, IEEE Press, USA, 1998.

    Google Scholar 

  15. Magkos E., Burmester M., Chrissikopoulos V., “Receipt-freeness in large-scale elections without untappable channels”,inProc. of the l st IFIP Conference on ECommerce/E-Business/E-Government,Zurich, October 2001, Kluwer Academic Publishers,pg.683–693,2001.

    Google Scholar 

  16. Mitrou L., Gritzalis D., Katsikas S., “Revisiting legal and regulatory requirements for secure e-voting”, in Proc. of the 17 th IFIP International Information Security Conference, pg. 469–480, Egypt 2002.

    Google Scholar 

  17. Mirk O., “Electronic voting schemes”, Semester Work, Tartu University, 2000.

    Google Scholar 

  18. Ikonomopoulos S., Lambrinoudakis C., Gritzalis D., Kokolakis S., Vassiliou K., “Functional requirements for a secure electronic voting system”, in Proc. of the 17 th IFIP International Information Security Conference, pg. 507–520, Egypt 2002.

    Google Scholar 

  19. Paillier P., “Public-key cryptosystems based on discrete logarithms residues”, in EUROCRYPT’99, LNCS 1592, Springer- Verlag, 1999.

    Google Scholar 

  20. Riera A., Borell J., Rifà J., “An uncoercible verifiable electronic voting protocol”, in Proc. of the IFIP International Information Security Conference, Vienna-Budapest, pg. 206–215,1998.

    Google Scholar 

  21. Riera A., “An introduction to electronic voting schemes”, Unitat de Combinatória i de Comunicació Digital, Universitat Autónoma de Barcelona, 1998.

    Google Scholar 

  22. Schöenmakers B., “A simple publicly verifiable secret sharing scheme and its application to electronic voting”, in Advances in Cryptology - CRYPTO’99, LNCS 1666, pg. 148–164, Springer-Verlag 1999.

    Google Scholar 

  23. Yung A., Young M., “A PVSS as hard as discrete log and shareholder separability”, in Proc. of 4th International Workshop on Practice and Theory in Public Key Cryptosystems, Korea, LNCS 1992, p. 287, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S. (2003). Secure Electronic Voting: the Current Landscape. In: Gritzalis, D.A. (eds) Secure Electronic Voting. Advances in Information Security, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0239-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-0239-5_7

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4981-5

  • Online ISBN: 978-1-4615-0239-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics