Skip to main content

Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia

  • Conference paper
Designing E-Business Systems. Markets, Services, and Networks (WEB 2008)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 22))

Included in the following conference series:

  • 1146 Accesses

Abstract

The Estonian parliamentary election in 2007 is regarded as a success story of large-scale Internet elections. I use this election in a single case study on practical security to show that low quality of security and its management does not necessarily prevent large-scale Internet elections from being conducted. I also provide research propositions with regard to future challenges for large-scale Internet elections.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abercrombie, N., Hill, S., Turner, B.S.: Dictionary of sociology. Penguin, Harmondsworth (1984)

    Google Scholar 

  2. Alvarez, R.M., Hall, T.: Point, Click, & Vote. Brookings Institution Press, Washington (2004)

    Google Scholar 

  3. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: STOC 1994, pp. 544–553 (1994)

    Google Scholar 

  4. Campbell, D.T., Stanley, J.C.: Experimental and quasi-experimental designs for research. Rand McNally, Chicago (1966)

    Google Scholar 

  5. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Crypto 1982, pp. 199–203 (1983)

    Google Scholar 

  6. Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. CACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  7. Cranor, L.F.: Electronic Voting: Computerized polls may save money, protect privacy. ACM Crossroads Student Magazine 2(4) (1996)

    Google Scholar 

  8. Cranor, L.F., Cytron, R.K.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: HICSS 1997, pp. 561–570 (1997)

    Google Scholar 

  9. Estonian National Electoral Committee: Main Statistics of E-Voting (2007), http://www.vvk.ee/english/Ivotingcomparison2005_2007.pdf

  10. Estonian National Electoral Committee: Parliamentary elections 2007: Statistics of e-voting (2007), http://www.vvk.ee/english/Ivoting_stat_eng.pdf

  11. European Union Democracy Observatory: Report for the Council of Europe: Internet Voting in the March 2007 Parliamentary Elections in Estonia (2007), http://www.vvk.ee/english/CoEandNEC_ReportE-Voting2007.pdf

  12. Flyvbjerg, B.: Five Misunderstandings About Case Study Research. Qualitative Inquiry 12(2), 219–245 (2006)

    Article  Google Scholar 

  13. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  14. Glaser, B., Strauss, A.: The discovery of grounded theory: Strategies for Qualitative Research. Aldine, New York (1967)

    Google Scholar 

  15. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  16. Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium 2002, pp. 339–353 (2002)

    Google Scholar 

  17. Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE) (2004), http://www.servesecurityreport.org

  18. Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: De Capitani di Vimercati, S., Dingledine, R. (eds.) WPES 2005, pp. 61–70. ACM Press, New York (2005)

    Google Scholar 

  19. Krimmer, R., Triessnig, S., Volkamer, M.: The Development of Remote E-Voting Around the World: A Review of Roads and Directions. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 1–15. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  20. Mohen, J., Glidden, J.: The Case for Internet Voting. CACM 44(1), 72–85 (2001)

    Article  Google Scholar 

  21. Nurmi, H., Salomaa, A., Santean, L.: Secret ballot elections in computer networks. Computers and Security 36(10), 553–560 (1991)

    Article  Google Scholar 

  22. Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Mark, T., Lomas, A., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  23. OSCE: OSCE/ODIHR Election Assessment Mission Report in the 2007 parliamentary elections in Estonia (2007), http://www.vvk.ee/english/OSCEreport_EST_2007.pdf

  24. Philips, D.M., von Spankovsky, H.A.: Gauging the Risks of Internet Elections. CACM 44(1), 73–85 (2001)

    Article  Google Scholar 

  25. Pieters, W.: What proof do we prefer? Variants of verifiability in voting. In: Ryan, P. (ed.) Proceedings of the Workshop on Electronic Voting and e-Government in the U.K. (2006), http://www.cs.ru.nl/~wolterp/Verifiability.pdf

  26. Punch, K.F.: Introduction to Social Research: Quantitative and Qualitative Approaches. Sage Publishing, London (2005)

    Google Scholar 

  27. Ragib, C.C., Becker, H.S. (eds.): What is a case? Exploring the foundations of social inquiry. Cambridge University Press, Cambridge (1992)

    Google Scholar 

  28. Sako, K., Kilian, J.: Receipt-free Mix-type Voting Scheme. In: Guillou, L., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  29. Schryen, G.: Security Aspects of Internet Voting. In: HICSS 2004 (2004)

    Google Scholar 

  30. Solvak, M., Pettai, V.: The parliamentary elections in Estonia, March 2007. Notes on Recent Elections/Electoral Studies 27(3), 547–577 (2008)

    Google Scholar 

  31. Stake, R.E.: The art of case study research. Sage Publications, Thousand Oaks (1995)

    Google Scholar 

  32. Svensson, J., Leenes, R.: E-Voting in Europe: Divergent democratic practice. Information Polity 8(1-2), 3–15 (2003)

    Google Scholar 

  33. Volkamer, M., Alkassar, A., Sadeghi, A.-R., Schultz, S.: Enabling the Application of Open Systems like PCs for Online Voting. In: FEE 2006 (2006), http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_application_of_open_systems_like-PCs_for_Online_Voting.pdf

  34. Volkamer, M., Grimm, R.: Multiple Cast in Online Voting – Analyzing Chances. In: Krimmer, R. (ed.) Electronic Voting 2006. LNI, vol. 86, pp. 97–106. Springer, Heidelberg (2006)

    Google Scholar 

  35. Yin, R.K.: Applications of case study research, 2nd edn. Sage Publications, Thousand Oaks (2003)

    Google Scholar 

  36. Yin, R.K.: Case study research: design and methods, 3rd edn. Sage Publications, Thousand Oaks (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schryen, G. (2009). Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In: Weinhardt, C., Luckner, S., Stößer, J. (eds) Designing E-Business Systems. Markets, Services, and Networks. WEB 2008. Lecture Notes in Business Information Processing, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01256-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01256-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01255-6

  • Online ISBN: 978-3-642-01256-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics