• Corpus ID: 8158839

Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

@article{Burton2015SecureAV,
  title={Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election},
  author={Craig Burton and Chris Culnane and Steve A. Schneider},
  journal={ArXiv},
  year={2015},
  volume={abs/1504.07098}
}
The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been able to cast a fully secret ballot in a verifiable way, and the first time a verifiable voting system has been used to collect remote votes in a political election. The code is open source, and the output from the election is verifiable. The… 

Figures from this paper

Analysis Of Electronic Voting Schemes In The Real World
TLDR
This paper identifies real-world issues and threats to electronic voting schemes and presents an analysis of schemes recently used in Australia and Estonia and presents recommendations to mitigate threats to such schemes when deployed in an untrustworthy environment.
Verifiability Experiences in Government Online Voting Systems
TLDR
This exploratory paper study the different approaches followed by the election organizers that offer online voting, their current status and derived future tendencies.
A Trustworthy Electronic Voting System for Australian Federal Elections
TLDR
An analysis of the iVote electronic voting system used for the 2017 Western Australian State Election is presented, outlining a number of security risks introduced by the use of cloud-based distributed denial of service mitigation.
End-to-End Verifiable E-Voting Trial for Polling Station Voting
TLDR
This was the first test of its kind in the United Kingdom, and it presented a case study to envisage the future of e-voting.
Fixing the Achilles Heel of E-Voting: The Bulletin Board
TLDR
This work presents novel attacks on the e-voting protocols Belenios, Civitas, and Helios that violate some of their central security claims under realistic system assumptions and proposes a BB protocol that satisfies final-agreement under weak, realistic trust assumptions and provides a machine-checked proof thereof.
End-to-End Verifiability in Voting Systems, from Theory to Practice
End-to-end verifiability represents a paradigm shift in electronic voting, providing a way to verify the integrity of the election by allowing voters to audit the information published by the system,
Problems with E-Voting in the 2014 Victorian State Election and Recommendations for Future Elections
TLDR
This submission addresses two issues related to e-voting in Victoria: i.
Practical Governmental Voting with Unconditional Integrity and Privacy
TLDR
This paper aims for a two-level contribution: first, it presents a concrete system with these security properties (one that works as a backend for common ballot styles like Scantegrity II or Pret a Voter); and second, it provides some insight into how different combinations of security assumptions are interdependent.
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios
TLDR
A security analysis of the Helios implementation was conducted and a range of vulnerabilities and implemented exploits were discovered that would allow a malicious election official to produce arbitrary election results with accepting proofs of correctness.
iVote: Do cost savings outweigh security risks?
  • K. Schwartz, Chunyan Bai
  • Computer Science
    2017 IEEE MIT Undergraduate Research Technology Conference (URTC)
  • 2017
TLDR
iVote allows voters to register, cast their vote and verify their vote from any internet capable device or phone, and allows disabled voters to cast a secret vote of their own without assistance.
...
1
2
...

References

SHOWING 1-10 OF 34 REFERENCES
vVote: A Verifiable Voting System
TLDR
This article presents the development of the Prêt à Voter design to a practical implementation used in a real state election in November 2014, called vVote, and analyzes its security properties.
A Practical Voter-Verifiable Election Scheme
TLDR
An election scheme designed to allow voters to verify that their vote is accurately included in the count is presented, providing a high degree of transparency whilst ensuring the secrecy of votes.
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
TLDR
A cryptographically end-to-end verifiable E2E remote voting system for absentee voters is proposed and implemented and its deployment in a binding municipal election in Takoma Park, Maryland is reported on.
A New Implementation of a Dual (Paper and Cryptographic) Voting System
TLDR
A new cryptographic voting system, designed to retain the "look and feel" of standard, paper-based voting used in Israel while enhancing security with end-to-end verifiability guaranteed by cryptographic voting, is reported on.
Helios: Web-based Open-Audit Voting
  • B. Adida
  • Computer Science
    USENIX Security Symposium
  • 2008
TLDR
Helios is the first web-based, open-audit voting system, publicly accessible today: anyone can create and run an election, and any willing observer can audit the entire process.
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
TLDR
The VoteBox is developed, a complete electronic voting system that combines several recent e-voting research results into a coherent whole that can provide strong end-to-end security guarantees to voters.
Secret-ballot receipts: True voter-verifiable elections
  • D. Chaum
  • Computer Science
    IEEE Security & Privacy Magazine
  • 2004
A new kind of receipt sets a far higher standard of security by letting voters verify the election outcome - even if all election computers and records were compromised. The system preserves ballot
Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity
TLDR
The design and use of Audiotegrity--a cryptographic voting protocol and corresponding voting system with some of the accessibility benefits of fully-electronic voting systems and some ofThe dispute resolution properties of paper-ballot-based systems are described.
Simple Verifiable Elections
TLDR
This paper describes a relatively simple but still effective approach to cryptographic elections, not as computationally efficient as previously proposed cryptographic approaches, but intended to be more accessible and therefore more suitable for comparison with other voting systems.
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
TLDR
This case study describes the various efforts that went into the Scantegrity II voting system--including the improved design and implementation of the voting system, streamlined procedures, agreements with the city, and assessments of the experiences of voters and poll workers.
...
1
2
3
4
...