Skip to main content

Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment

  • Chapter
Foundations of Security Analysis and Design V (FOSAD 2009, FOSAD 2007, FOSAD 2008)

Abstract

This paper discusses how electronic voting was implemented in practice in the Netherlands, which choices were made and how electronic voting was finally abolished. This history is presented in the context of the requirements of the election process, as well as the technical options that are available to increase the reliability and security of electronic voting.

Version of June 3, 2009, for FOSAD 2008/2009 Tutorial Lectures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abe, M.: Universally verifiable mix-net with verification work independent of the number of mix-servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437–447. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Adviesommissie Inrichting Verkiezingsproces. Stemmen met vertrouwen (September 2007), http://www.minbzk.nl/contents/pages/89927/advies.pdf (consulted May 28, 2009)

  3. Anderson, R.: Security Engineering. John Wiley & Sons, Chichester (2001), http://www.cl.cam.ac.uk/~rja14/book.html

    Google Scholar 

  4. Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 1982, pp. 199–203. Plenum Press (1983)

    Google Scholar 

  5. Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Security & Privacy 2(1), 38–47 (2004)

    Article  Google Scholar 

  6. Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Cramer, R., Franklin, M.K., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  8. Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  9. Evans, D., Paul, N.: Election security: perception and reality. IEEE Security & Privacy 2(1), 24–31 (2004)

    Article  Google Scholar 

  10. Het Expertise Centrum, consultants voor overheidsinformatisering. Stand van zaken automatisering rond verkiezingsproces (May 28, 1999)

    Google Scholar 

  11. Het Expertise Centrum, consultants voor overheidsinformatisering. Definitierapport kiezen op afstand (September 15, 2000)

    Google Scholar 

  12. Gedrojc, B., Hueck, M., Hoogstraten, H., Koek, M., Resink, S.: Rapportage advisering toelaatbaarheid internetstemvoorziening waterschappen. Fox-IT (August 12, 2008), http://www.verkeerenwaterstaat.nl/Images/20081302%20Bijlage%201%20Rappo%rt_tcm195-228336.pdf

    Google Scholar 

  13. Gonggrijp, R., Hengeveld, W.-J., Bogk, A., Engling, D., Mehnert, H., Rieger, F., Scheffers, P., Wels, B.: Nedap/Groenendaal ES3B voting computer: a security analysis (October 6, 2006), http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf (consulted May 28, 2009)

  14. Gonggrijp, R., Hengeveld, W.-J., Hotting, E., Schmidt, S., Weidemann, F.: Ries — Rijnland Internet Election System. Very quick scan of published source code and documentation (July 2008), http://www.wijvertrouwenstemcomputersniet.nl/images/7/7f/RIES.pdf (consulted May 28, 2009)

  15. Hermans, L.M.L.H.A., van Twist, M.J.W.: Stemmachines: een verweesd dossier. Rapport van de commissie besluitvorming stemmachines (April 2007), http://www.minbzk.nl/contents/pages/86914/rapportstemmachineseenverwees%ddossier.pdf (consulted May 28, 2009)

  16. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Hubbers, E., Jacobs, B., Pieters, W.: RIES – Internet voting in action. In: Bilof, R. (ed.) Proc. 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, pp. 417–424. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  18. Hubbers, E., Jacobs, B., Schoenmakers, B., van Tilborg, H., de Weger, B.: Description and analysis of the RIES internet voting system. Version 1.0 (June 24, 2008), http://www.win.tue.nl/eipsi/images/RIES_descr_anal_v1.0_June_24.pdf

  19. Kiniry, J.R., Morkan, A.E., Cochran, D., Fairmichael, F., Chalin, P., Oostdijk, M., Hubbers, E.: The KOA remote voting system: A summary of work to date. In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol. 4661, pp. 244–262. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  20. Kuhn, M., Friedrichs, G., Aksoy, A., Koch, E., Friedrichs, L.: Tempest specificaties en testmethoden voor elektronische stemapparatuur. Appendix BLG15766 of Kamerstuk 2007-2008, 31200 VII, nr. 64, Tweede Kamer (May 21, 2008)

    Google Scholar 

  21. Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and breaking of cooperative relations. Basil Blackwell, Oxford (1988)

    Google Scholar 

  22. Madise, Ü., Vinkel, P., Maaten, E.: Internet voting at the elections of local government councils on October 2005 (2006), http://www.vvk.ee/english/report2006.pdf (consulted November 9, 2007), not online anymore

  23. Mercuri, R.T.: A better ballot box? IEEE Spectrum 39(10), 26–50 (2002)

    Article  Google Scholar 

  24. Ministerie van Binnenlandse Zaken en Koninkrijksrelaties: Project kiezen op afstand. report BPR2004/U79957 (November 11, 2004), http://www.minbzk.nl/onderwerpen/grondwet-en/verkiezingen-en/kiezen-op-afstand/kamerstukken?ActItmIdt=12800 (consulted May 29, 2009)

  25. Nikander, P., Karvonen, K.: Users and trust in cyberspace. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 24–35. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  26. Oostveen, A.M., Van den Besselaar, P.: The effects of voting technologies on voting behaviour: Issues of trust and social identity. Social Science Computer Review 23(3), 304–311 (2005)

    Article  Google Scholar 

  27. OSCE Office for Democratic Institutions and Human Rights. The Netherlands parliamentary elections 22 November 2006: OSCE/ODIHR election assessment mission report (March 12, 2007), http://www.osce.org/item/23602.html (consulted May 28, 2009)

  28. Park, J.H.: England’s controversy over the secret ballot. Political Science Quarterly 46(1), 51–86 (1931)

    Article  Google Scholar 

  29. Pieters, W.: Acceptance of voting technology: Between confidence and trust. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 283–297. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  30. Pieters, W.: What proof do we prefer? variants of verifiability in voting. In: Ryan, P., Anderson, S., Storer, T., Duncan, I., Bryans, J. (eds.) Workshop on e-Voting and e-Government in the UK, Edinburgh, February 27-28, pp. 33–39. e-Science Institute, University of St. Andrews (2006)

    Google Scholar 

  31. Pieters, W.: La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen (January 2008)

    Google Scholar 

  32. Pieters, W., Becker, M.: Ethics of e-voting: An essay on requirements and values in Internet elections. In: Brey, P., Grodzinsky, F., Introna, L. (eds.) Ethics of New Information Technology: Proc. Sixth International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2005), Enschede, pp. 307–318. Center for Telematics and Information Technology (2005)

    Google Scholar 

  33. Robers, H.: Electronic elections employing DES smartcards. Master’s thesis (December 1998), http://www.surfnet.nl/bijeenkomsten/ries/robers_scriptie_election.pdf (consulted November 9, 2007), not online anymore

  34. Sako, K., Kilian, J.: Receipt-free mix-type voting scheme – a practical solution to the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  35. Saltman, R.G.: The History and Politics of Voting Technology. Palgrave Macmillan, New York (2006)

    Book  Google Scholar 

  36. Schoenmakers, B.: Voting schemes. In: Atallah, M., Blanton, M. (eds.) Tools and algorithms for the contruction and analysis of systems. CRC-Press, Boca Raton (to appear, 2009)

    Google Scholar 

  37. Selker, T., Goler, J.: Security vulnerabilities and problems with VVPT. Caltech / MIT Voting Technology Project, Working Paper #16 (2004), http://www.vote.caltech.edu/drupal/files/working_paper/vtp_wp16.pdf (consulted May 28, 2009)

  38. Verbeek, P.P.C.C.: What things do: Philosophical Reflections on Technology, Agency, and Design. Pennsylvania State University Press (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jacobs, B., Pieters, W. (2009). Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Aldini, A., Barthe, G., Gorrieri, R. (eds) Foundations of Security Analysis and Design V. FOSAD FOSAD FOSAD 2009 2007 2008. Lecture Notes in Computer Science, vol 5705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03829-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03829-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03828-0

  • Online ISBN: 978-3-642-03829-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics