Advertisement

Improving the Verifiability of the Estonian Internet Voting Scheme

  • Sven HeibergEmail author
  • Tarvi Martens
  • Priit Vinkel
  • Jan Willemson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10141)

Abstract

We describe an update of the Estonian Internet Voting scheme targeted towards adding verification capabilities to the central system. We propose measures to ensure the auditability of the correctness of vote decryption and i-ballot box integrity. The latter will be improved to a level where it would be possible to outsource the vote collection process to an untrusted party and later fully verify the correctness of its operations.

Keywords

Election Organizer Vote Result Eligible Voter Data Auditor Internet Vote 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

This research has been supported by the Estonian Research Council under grant No. IUT27-1.

References

  1. 1.
    Ansper, A., Buldas, A., Jürgenson, A., Oruaas, M., Priisalu, J., Raiend, K., Veldre, A., Willemson, J., Virunurm, K.: E-voting concept security: analysis and measures (2010). http://www.vvk.ee/public/dok/General_Description_E-Voting_2010.pdf
  2. 2.
    Bayer, S., Groth, J.: Efficient zero-knowledge argument for correctness of a shuffle. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 263–280. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-29011-4_17 CrossRefGoogle Scholar
  3. 3.
    Estonian National Electoral Committee. Statistics about Internet Voting in Estonia. http://vvk.ee/voting-methods-in-estonia/engindex/statistics
  4. 4.
    Fauzi, P., Lipmaa, H.: Efficient culpably sound NIZK shuffle argument without random oracles. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 200–216. Springer, Heidelberg (2016). doi: 10.1007/978-3-319-29485-8_12 CrossRefGoogle Scholar
  5. 5.
    Goggin, S.N., Byrne, M.D., Gilbert, J.E.: Post-election auditing: effects of procedure and ballot type on manual counting accuracy, efficiency, and auditor satisfaction and confidence. Election Law J. 11(1), 36–51 (2012)Google Scholar
  6. 6.
    Heiberg, S., Laud, P., Willemson, J.: The application of i-voting for Estonian parliamentary elections of 2011. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 208–223. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-32747-6_13 CrossRefGoogle Scholar
  7. 7.
    Heiberg, S., Willemson, J.: Modeling threats of a voting method. In: Zissis, D., Lekkas, D. (eds.) Design, Development, and Use of Secure Electronic Voting Systems, pp. 128–148. IGI Global, Hershey (2014)CrossRefGoogle Scholar
  8. 8.
    Heiberg, S., Willemson, J.: Verifiable Internet voting in Estonia. In: Krimmer, R., Volkamer, M. (eds.) 6th International Conference on Electronic Voting 2014, (EVOTE 2014), Bregenz, Austria, 28–31 October 2014, pp. 23–29. TUT Press (2014)Google Scholar
  9. 9.
    Joaquim, R., Ferreira, P., Ribeiro, C.: EVIV: an end-to-end verifiable Internet voting system. Comput. Secur. 32, 170–191 (2013)CrossRefGoogle Scholar
  10. 10.
    Küsters, R., Truderung, T., Vogt, A.: Clash attacks on the verifiability of e-voting systems. In: IEEE Symposium on Security and Privacy, SP 2012, San Francisco, California, USA, 21–23 May 2012, pp. 395–409. IEEE Computer Society (2012)Google Scholar
  11. 11.
    Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.L.: Performance requirements for end-to-end verifiable elections. In: Jones, D.W., Quisquater, J-J., Rescorla, E. (eds.) In: Proceeding of the 2010 International Conference on Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2010, Washington, D.C., USA, 9–10 August 2010. USENIX Association (2010)Google Scholar
  12. 12.
    Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 688–689. Springer, Heidelberg (1990). doi: 10.1007/3-540-46885-4_68 Google Scholar
  13. 13.
    Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.A.: Security analysis of the Estonian Internet voting system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703–715. ACM (2014)Google Scholar
  14. 14.
    Terelius, B., Wikström, D.: Proofs of restricted shuffles. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 100–113. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-12678-9_7 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Sven Heiberg
    • 1
    • 2
    Email author
  • Tarvi Martens
    • 2
  • Priit Vinkel
    • 3
  • Jan Willemson
    • 4
    • 5
  1. 1.Smartmatic-Cybernetica Centre of Excellence for Internet VotingTartuEstonia
  2. 2.Electronic Voting CommitteeTallinnEstonia
  3. 3.Chancellery of Riigikogu, Secretariat of National Electoral CommitteeTallinnEstonia
  4. 4.CyberneticaTartuEstonia
  5. 5.Software Technology and Applications Competence CentreTartuEstonia

Personalised recommendations