• Corpus ID: 244129931

RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail

@article{Crimmins2021RemoteVoteAS,
  title={RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail},
  author={Braden L. Crimmins and Marshal Rhea and J. Alex Halderman},
  journal={ArXiv},
  year={2021},
  volume={abs/2111.08662}
}
Postal voting is growing rapidly in the U.S., with 43% of voters casting ballots by mail in 2020, yet until recently there has been little research about extending the protections of end-to-end verifiable (E2E-V) election schemes to vote-by-mail contexts. The first—and to date, only—framework to focus on this setting is STROBE, which has important usability limitations. In this work, we present two approaches, RemoteVote and SAFE Vote, that allow mail-in voters to benefit from E2E-V without… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 31 REFERENCES

What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes

A usability evaluation of three different approaches of the Benaloh Challenge in the remote e-voting context is reported on and a recommendation for which approaches should be provided to afford verification in real-world elections is concluded.

Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System

A cryptographically end-to-end verifiable E2E remote voting system for absentee voters is proposed and implemented and its deployment in a binding municipal election in Takoma Park, Maryland is reported on.

Universal Cast-as-Intended Verifiability

This work presents the first cast-as-intended verification mechanism which is universally verifiable, i.e., the first protocol in which anyone (the voter herself or another party) can check that the contents of an encrypted vote match the voter’s selections.

Selene: Voting with Transparent Verifiability and Coercion-Mitigation

This paper takes a different approach and revisit an old idea: to provide each voter with a private tracking number, to ensure that no two voters are assigned the same tracker and to keep the link between voters and trackers private.

Towards a Framework on the Security Requirements for Electronic Voting Protocols

This paper provides definitions of different levels of election secrecy and verifiability, and investigates whether there exists an order for the different levels and provide adversary models.

Helios: Web-based Open-Audit Voting

  • B. Adida
  • Computer Science
    USENIX Security Symposium
  • 2008
Helios is the first web-based, open-audit voting system, publicly accessible today: anyone can create and run an election, and any willing observer can audit the entire process.

Public Evidence from Secret Ballots

Election integrity involves two key concepts: convincing evidence that outcomes are correct and privacy, which amounts to convincing assurance that there is no evidence about how any given person voted, which are obviously in tension.

Running Mixnet-Based Elections with Helios

A variant of Helios that allows an efficient mixnet-based tallying procedure, and a modified version the TDH2 scheme of Shoup and Gennaro that is particularly suitable for the encryption of the ballots is presented.

Dispute Resolution in Voting

This work systematically characterize all relevant disputes for a generic, practically relevant, class of voting protocols and proposes a new definition of dispute resolution for voting that accounts for the possibility that both voters and the voting authority can make false claims and that voters may abstain from voting.

Simple Verifiable Elections

This paper describes a relatively simple but still effective approach to cryptographic elections, not as computationally efficient as previously proposed cryptographic approaches, but intended to be more accessible and therefore more suitable for comparison with other voting systems.