Advertisement

A Practical Voter-Verifiable Election Scheme

  • David Chaum
  • Peter Y. A. Ryan
  • Steve Schneider
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3679)

Abstract

We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the voting system. The scheme also seeks to make the voter interface as familiar as possible.

Keywords

Candidate List Bulletin Board Voter Choice Error Handling Visual Cryptography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brumbaugh, R.S.: Ancient Greek Gadgets and Machines. Thomas Y. Crowell (1966)Google Scholar
  2. 2.
    Bryans, J.W., Ryan, P.Y.A.: A Dependability Analysis of the Chaum Voting Scheme. Technical Report CS-TR-809, University of Newcastle (2003)Google Scholar
  3. 3.
    Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy 2(1), 38–47 (2004)CrossRefGoogle Scholar
  4. 4.
    Jakobsson, M., Juels, M., Rivest, R.: Making Mix Nets Robust for Electronic Voting by Randomised Partial Checking. In: USENIX 2002 (2002)Google Scholar
  5. 5.
    Mercuri, R.: A better ballot box? IEEE Spectrum 39(10) (2002)Google Scholar
  6. 6.
    Andrew Neff, C.: A verifiable secret shuffle and its application to e-voting. In: ACM-CCS (2001)Google Scholar
  7. 7.
    Ryan, P.Y.A.: A Variant of the Chaum Voter-Verifiable Scheme. Technical Report CS-TR 864, University of Newcastle, 2004, Also in WITS 2005: Workshop on Issues in the Theory of SecurityGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • David Chaum
    • 1
  • Peter Y. A. Ryan
    • 2
  • Steve Schneider
    • 3
  1. 1.Votegrity 
  2. 2.School of Computing ScienceUniversity of Newcastle 
  3. 3.Department of ComputingUniversity of Surrey 

Personalised recommendations