Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment

  • Bart Jacobs
  • Wolter Pieters
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5705)

Abstract

This paper discusses how electronic voting was implemented in practice in the Netherlands, which choices were made and how electronic voting was finally abolished. This history is presented in the context of the requirements of the election process, as well as the technical options that are available to increase the reliability and security of electronic voting.

References

  1. 1.
    Abe, M.: Universally verifiable mix-net with verification work independent of the number of mix-servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437–447. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  2. 2.
    Adviesommissie Inrichting Verkiezingsproces. Stemmen met vertrouwen (September 2007), http://www.minbzk.nl/contents/pages/89927/advies.pdf (consulted May 28, 2009)
  3. 3.
    Anderson, R.: Security Engineering. John Wiley & Sons, Chichester (2001), http://www.cl.cam.ac.uk/~rja14/book.html Google Scholar
  4. 4.
    Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 1982, pp. 199–203. Plenum Press (1983)Google Scholar
  5. 5.
    Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Security & Privacy 2(1), 38–47 (2004)CrossRefGoogle Scholar
  6. 6.
    Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Cramer, R., Franklin, M.K., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  8. 8.
    Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  9. 9.
    Evans, D., Paul, N.: Election security: perception and reality. IEEE Security & Privacy 2(1), 24–31 (2004)CrossRefGoogle Scholar
  10. 10.
    Het Expertise Centrum, consultants voor overheidsinformatisering. Stand van zaken automatisering rond verkiezingsproces (May 28, 1999)Google Scholar
  11. 11.
    Het Expertise Centrum, consultants voor overheidsinformatisering. Definitierapport kiezen op afstand (September 15, 2000)Google Scholar
  12. 12.
    Gedrojc, B., Hueck, M., Hoogstraten, H., Koek, M., Resink, S.: Rapportage advisering toelaatbaarheid internetstemvoorziening waterschappen. Fox-IT (August 12, 2008), http://www.verkeerenwaterstaat.nl/Images/20081302%20Bijlage%201%20Rappo%rt_tcm195-228336.pdf Google Scholar
  13. 13.
    Gonggrijp, R., Hengeveld, W.-J., Bogk, A., Engling, D., Mehnert, H., Rieger, F., Scheffers, P., Wels, B.: Nedap/Groenendaal ES3B voting computer: a security analysis (October 6, 2006), http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf (consulted May 28, 2009)
  14. 14.
    Gonggrijp, R., Hengeveld, W.-J., Hotting, E., Schmidt, S., Weidemann, F.: Ries — Rijnland Internet Election System. Very quick scan of published source code and documentation (July 2008), http://www.wijvertrouwenstemcomputersniet.nl/images/7/7f/RIES.pdf (consulted May 28, 2009)
  15. 15.
    Hermans, L.M.L.H.A., van Twist, M.J.W.: Stemmachines: een verweesd dossier. Rapport van de commissie besluitvorming stemmachines (April 2007), http://www.minbzk.nl/contents/pages/86914/rapportstemmachineseenverwees%ddossier.pdf (consulted May 28, 2009)
  16. 16.
    Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  17. 17.
    Hubbers, E., Jacobs, B., Pieters, W.: RIES – Internet voting in action. In: Bilof, R. (ed.) Proc. 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, pp. 417–424. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  18. 18.
    Hubbers, E., Jacobs, B., Schoenmakers, B., van Tilborg, H., de Weger, B.: Description and analysis of the RIES internet voting system. Version 1.0 (June 24, 2008), http://www.win.tue.nl/eipsi/images/RIES_descr_anal_v1.0_June_24.pdf
  19. 19.
    Kiniry, J.R., Morkan, A.E., Cochran, D., Fairmichael, F., Chalin, P., Oostdijk, M., Hubbers, E.: The KOA remote voting system: A summary of work to date. In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol. 4661, pp. 244–262. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  20. 20.
    Kuhn, M., Friedrichs, G., Aksoy, A., Koch, E., Friedrichs, L.: Tempest specificaties en testmethoden voor elektronische stemapparatuur. Appendix BLG15766 of Kamerstuk 2007-2008, 31200 VII, nr. 64, Tweede Kamer (May 21, 2008)Google Scholar
  21. 21.
    Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and breaking of cooperative relations. Basil Blackwell, Oxford (1988)Google Scholar
  22. 22.
    Madise, Ü., Vinkel, P., Maaten, E.: Internet voting at the elections of local government councils on October 2005 (2006), http://www.vvk.ee/english/report2006.pdf (consulted November 9, 2007), not online anymore
  23. 23.
    Mercuri, R.T.: A better ballot box? IEEE Spectrum 39(10), 26–50 (2002)CrossRefGoogle Scholar
  24. 24.
    Ministerie van Binnenlandse Zaken en Koninkrijksrelaties: Project kiezen op afstand. report BPR2004/U79957 (November 11, 2004), http://www.minbzk.nl/onderwerpen/grondwet-en/verkiezingen-en/kiezen-op-afstand/kamerstukken?ActItmIdt=12800 (consulted May 29, 2009)
  25. 25.
    Nikander, P., Karvonen, K.: Users and trust in cyberspace. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 24–35. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  26. 26.
    Oostveen, A.M., Van den Besselaar, P.: The effects of voting technologies on voting behaviour: Issues of trust and social identity. Social Science Computer Review 23(3), 304–311 (2005)CrossRefGoogle Scholar
  27. 27.
    OSCE Office for Democratic Institutions and Human Rights. The Netherlands parliamentary elections 22 November 2006: OSCE/ODIHR election assessment mission report (March 12, 2007), http://www.osce.org/item/23602.html (consulted May 28, 2009)
  28. 28.
    Park, J.H.: England’s controversy over the secret ballot. Political Science Quarterly 46(1), 51–86 (1931)CrossRefGoogle Scholar
  29. 29.
    Pieters, W.: Acceptance of voting technology: Between confidence and trust. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 283–297. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  30. 30.
    Pieters, W.: What proof do we prefer? variants of verifiability in voting. In: Ryan, P., Anderson, S., Storer, T., Duncan, I., Bryans, J. (eds.) Workshop on e-Voting and e-Government in the UK, Edinburgh, February 27-28, pp. 33–39. e-Science Institute, University of St. Andrews (2006)Google Scholar
  31. 31.
    Pieters, W.: La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen (January 2008)Google Scholar
  32. 32.
    Pieters, W., Becker, M.: Ethics of e-voting: An essay on requirements and values in Internet elections. In: Brey, P., Grodzinsky, F., Introna, L. (eds.) Ethics of New Information Technology: Proc. Sixth International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2005), Enschede, pp. 307–318. Center for Telematics and Information Technology (2005)Google Scholar
  33. 33.
    Robers, H.: Electronic elections employing DES smartcards. Master’s thesis (December 1998), http://www.surfnet.nl/bijeenkomsten/ries/robers_scriptie_election.pdf (consulted November 9, 2007), not online anymore
  34. 34.
    Sako, K., Kilian, J.: Receipt-free mix-type voting scheme – a practical solution to the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  35. 35.
    Saltman, R.G.: The History and Politics of Voting Technology. Palgrave Macmillan, New York (2006)CrossRefGoogle Scholar
  36. 36.
    Schoenmakers, B.: Voting schemes. In: Atallah, M., Blanton, M. (eds.) Tools and algorithms for the contruction and analysis of systems. CRC-Press, Boca Raton (to appear, 2009)Google Scholar
  37. 37.
    Selker, T., Goler, J.: Security vulnerabilities and problems with VVPT. Caltech / MIT Voting Technology Project, Working Paper #16 (2004), http://www.vote.caltech.edu/drupal/files/working_paper/vtp_wp16.pdf (consulted May 28, 2009)
  38. 38.
    Verbeek, P.P.C.C.: What things do: Philosophical Reflections on Technology, Agency, and Design. Pennsylvania State University Press (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Bart Jacobs
    • 1
  • Wolter Pieters
    • 2
  1. 1.Digital Security groupRadboud University NijmegenNetherlands
  2. 2.Centre for Telematics and Information TechnologyUniversity of TwenteNetherlands

Personalised recommendations