Skip to main content

Paperless Independently-Verifiable Voting

  • Conference paper
E-Voting and Identity (Vote-ID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7187))

Included in the following conference series:

Abstract

We present a new model for polling-booth voting: the voter enters the polling booth with a computational assistant which helps her verify that her vote is correctly recorded. The assistant interacts with the voting system while the voter votes on the machine in the polling booth. We present an independently-verifiable, coercion-resistant protocol based on this model. Unlike all other independently-verifiable protocols, this one is completely paperless and does not require the voter to perform any tasks outside the polling booth. We provide property definitions, rigorous claims and a description of a prototype.

This work was done while Nandi was at The George Washington University. Florescu, Rubio and Vora were supported in part by NSF Award No. 0831149, Nandi and Zagórski by NSF Award No. 0937267. Zagórski was also supported in part by the Polish Ministry of Science and Higher Education scientific project - grant N N206 369839.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adida, B. Advances in Cryptographic Voting Systems. PhD thesis, MIT (2006)

    Google Scholar 

  2. Adida, B.: Helios: Web-based Open-Audit Voting. In: Usenix Security Symposium (2008)

    Google Scholar 

  3. Benaloh, J.: Simple verifiable elections. In: USENIX/Accurate Electronic Voting Technology Workshop (2006)

    Google Scholar 

  4. Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: USENIX/Accurate Electronic Voting Technology Workshop (2007)

    Google Scholar 

  5. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: ACM Symposium on Theory of Computing (1994)

    Google Scholar 

  6. Carback, R., Chaum, D., Clark, J., Essex, A., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. In: Usenix Security Symposium (2010)

    Google Scholar 

  7. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy, 38–47 (January/February 2004)

    Google Scholar 

  8. Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity: End-to-end verifiability for optical scan elections. IEEE Transactions on Information Forensics and Security: Special Issue on Electronic Voting 4(4), 611–627 (2009)

    Article  Google Scholar 

  9. Chaum, D., Popoveniuc, S., Vora, P.L.: eTegrity and ePunchscan. In: NIST End-to-End Voting Systems Workshop (October 2009), http://csrc.nist.gov/groups/ST/e2evoting/documents/papers/Popoveniuc_PaperlessVoting.pdf

  10. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM 28(6), 637–647 (1985)

    Article  MathSciNet  Google Scholar 

  11. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Workshop on Privacy in the Electronic Society, WPES (2005)

    Google Scholar 

  12. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC (2008)

    Google Scholar 

  13. Kelsey, J., Regenscheid, A., Moran, T., Chaum, D.: Attacking Paper-Based E2E Voting Systems. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 370–387. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. Neff, C. A.: Practical high certainty intent verification for encrypted votes (2004)

    Google Scholar 

  15. Popoveniuc, S., Hosp, B.: An Introduction to PunchScan. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 242–259. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Ryan, P.Y.A.: A variant of the Chaum voter-verifiable scheme. Tech. Rep. CS-TR: 864, School of Computing Science, Newcastle University (2004)

    Google Scholar 

  17. Sandler, D.R., Derr, K., Wallach, D.S.: VoteBox: a tamper-evident, verifiable electronic voting system. In: USENIX Security Symposium (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chaum, D. et al. (2012). Paperless Independently-Verifiable Voting. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32747-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32746-9

  • Online ISBN: 978-3-642-32747-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics