End-to-end verifiability
@article{Benaloh2015EndtoendV, title={End-to-end verifiability}, author={Josh Benaloh and Ronald L. Rivest and Peter Y. A. Ryan and Philip B. Stark and Vanessa Teague and Poorvi L. Vora}, journal={ArXiv}, year={2015}, volume={abs/1504.03778} }
Author(s): Benaloh, Josh; Rivest, Ronald; Ryan, Peter YA; Stark, Philip; Teague, Vanessa; Vora, Poorvi | Abstract: This pamphlet describes end-to-end election verifiability (E2E-V) for a nontechnical audience: election officials, public policymakers, and anyone else interested in secure, transparent, evidence-based electronic elections. This work is part of the Overseas Vote Foundation's End-to-End Verifiable Internet Voting: Specification and Feasibility Assessment Study (E2E VIV Project…
31 Citations
Public Evidence from Secret Ballots
- Computer ScienceE-VOTE-ID
- 2017
Election integrity involves two key concepts: convincing evidence that outcomes are correct and privacy, which amounts to convincing assurance that there is no evidence about how any given person voted, which are obviously in tension.
A Protocolized, Comparative Study of Helios Voting and Scytl/iVote
- Computer Science2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG)
- 2019
The problem is addressed by applying a practical evaluation framework to two of the most relevant e-voting tools: Helios Voting and iVote from Scytl, strongly based on the technical requirements issued by the Council of Europe in 2017.
Proverum: A Hybrid Public Verifiability and Decentralized Identity Management
- Computer ScienceArXiv
- 2020
This work introduces Proverum, an approach combining a private environment based on private permissioned Distributed Ledgers with a public environmentbased on public Blockchains, and describes the application of the proverum architecture to the Swiss Remote Postal Voting system, mitigating threats present in the current system.
Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election
- Political Science, Computer ScienceArXiv
- 2015
The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling…
The Swiss Post/Scytl Transparency Exercise and Its Possible Impact on Internet Voting Regulation
- Law
- 2019
Researchers found critical errors in the source code of both individual and universal verifiability in the Swiss Post/Scytl system, which has fuelled the already heated debate over the future development of internet voting in Switzerland.
How to Assess the Usability Metrics of E-Voting Schemes
- Computer ScienceFinancial Cryptography Workshops
- 2019
An overview of user study design challenges when investigating end-to-end verifiable e-voting schemes is given and guidelines that address these challenges and support researchers in the design of user studies are provided.
RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail
- Computer ScienceArXiv
- 2021
This work presents two approaches, RemoteVote and SAFE Vote, that allow mail-in voters to benefit from E2E-V without changing the voter experience for those who choose not to participate in verification.
Going from bad to worse: from Internet voting to blockchain voting
- Computer ScienceJ. Cybersecur.
- 2021
Prior research on the security risks of online and electronic voting is analyzed and systematized, showing that not only do these risks persist in blockchain-based voting systems, but blockchains may introduce 'additional' problems for voting systems.
Technical and Socio-Technical Attacks on the Danish Party Endorsement System
- Computer ScienceE-VOTE-ID
- 2019
This paper analyzes the security of the online Danish party endorsement system (DVE) and presents two attacks: one technical, which compromises the integrity of the endorsements stored in the DVE-database and another socio-technical, which allows parties to circumvent mechanisms to protect voters against abuse.
The Effect of Homomorphic Encryption on Voters' Perceptions of Security in Election Systems
- Computer Science
- 2022
This work seeks to determine the degree to which the perception of security affects electoral system use, and would a technical solution, such as homomorphic encryption change the Perception of security in election systems.
References
On the notion of ‘software independence’ in voting systems
- Computer SciencePhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
- 2008
This paper defines and explores the notion of ‘software independence’ in voting systems: ‘A voting system is software independent if an (undetected) change or error in its software cannot cause an…