Security in e-voting

被引:1
作者
Kuesters, Ralf [1 ]
Truderung, Tomasz [2 ]
机构
[1] Univ Trier, FB Informat IV, Dept Comp Sci, D-54286 Trier, Germany
[2] Univ Trier, FB Informat IV, D-54286 Trier, Germany
来源
IT-INFORMATION TECHNOLOGY | 2014年 / 56卷 / 06期
关键词
E-voting; information flow; non-interference; cryptography; simulation-based security; universal composability;
D O I
10.1515/itit-2014-1062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Systems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors andmalicious behavior resulting in the loss of votes and incorrect election outcomes easily go undetected. In fact, numerous problems with evoting systems have been reported in various countries. Therefore, in recent years modern e-voting systems have been designed that, among others, allow voters to check that their votes were counted correctly, even if voting machines and servers have programming errors or are outright malicious. In this paper, after a brief discussion of the problems of today's e-voting systems, we explain fundamental security properties modern e-voting systems should provide, including the above mentioned so-called verifiability property, and present a simple e-voting system to illustrate some of these properties. One important goal of ourwork is to provide security guarantees of such systems not only for abstract mathematical/cryptographic models of the systems but for the implementation of the systems directly. This requires us to combine various techniques and tools from security/cryptography, program analysis, and verification.
引用
收藏
页码:300 / 306
页数:7
相关论文
共 18 条
[1]  
Adida B., 2009, USENIX ACCURATE ELEC
[2]  
BECKERT B, 2007, LNCS, V4334
[3]  
Canetti R., 2000, IACR CRYPTOLOGY EPRI, V2000, P67
[4]  
Carback R., 2010, USENIX SECURITY S AC
[5]   Civitas: Toward a secure voting system [J].
Clarkson, Michael R. ;
Chong, Stephen ;
Myers, Andrew C. .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :354-368
[6]  
Culnane Chris, 2014, CORR
[7]  
Eakin B, 2013, USENIX J ELECTION TE, V1, P18
[8]   Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs [J].
Hammer, Christian ;
Snelting, Gregor .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) :399-422
[9]   A Framework for the Cryptographic Verification of Java']Java-like Programs [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Graf, Juergen .
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, :198-212
[10]   Clash Attacks on the Verifiability of E-Voting Systems [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Vogt, Andreas .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :395-409