Protection Profile for Secure E-Voting Systems

  • Kwangwoo Lee
  • Yunho Lee
  • Dongho Won
  • Seungjoo Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6047)

Abstract

In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.

Keywords

e-voting system common criteria evaluation protection profile verifiability voter verifiable audit trail 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mercuri, R.: A Better Ballot Box? IEEE Spectrum Online, 46–50 (October 2002)Google Scholar
  2. 2.
    Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.: Analysis of an Electronic Voting System. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, California, May 2004, pp. 27–42. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
  3. 3.
    Fujioka, Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)Google Scholar
  4. 4.
    Maaten, E.: Towards remote e-voting: Estonian case. In: Electronic Voting in Europe Proceedings of the 1st International Workshop on Electronic Voting, pp. 83–100 (2004)Google Scholar
  5. 5.
    Cetinkaya, O., Cetinkaya, D.: Verification and Validation Issues in Electronic Voting. The Electronic Journal of e-Government 5(2), 117–126 (2007)MathSciNetGoogle Scholar
  6. 6.
    Neff, A.C., Adler, J.: Verifiable e-Voting: Indisputable Electronic Elections at Polling Places. VoteHere Inc. (2003), http://votehere.com/vhti/documentation/VH_VHTi_WhitePaper.pdf
  7. 7.
    CCMB, Common Criteria for Information Technology Security Evaluation, version 3.1, CCMB-2006-09-004 (2006)Google Scholar
  8. 8.
    Oksana, S.: A Protection Profile and Its Content. In: SIBCON 2005 Proceeding, pp. 60–64 (2005)Google Scholar
  9. 9.
    Volkamer, M., Vogt, R.: Digitales wahlstift-system. Common Criteria Protection Profile BSI-PP-0031. Bundesamt für Sicherheit in der Informationstechnik (2006)Google Scholar
  10. 10.
    Secretariat general de la defense nationale, Protection Profile: Machine a voter, PP-CIVIS (2006), http://www.commoncriteriaportal.org/files/ppfiles/pp0604.pdf
  11. 11.
    IEEE P1583 SCC 38, IEEE P1583TM/D5.0 Draft standard for the Evaluation of Voting Equipment (2005)Google Scholar
  12. 12.
    Lee, Y., Lee, K., Kim, S., Won, D.: Efficient Voter Verifiable E-Voting Schemes with Cryptographic Receipts. In: Proc. of IAVoSS Workshop On Trustworthy Election (WOTE 2006), Cambridge, United Kingdom, pp. 145–152 (2006)Google Scholar
  13. 13.
    Sako, K., Kilian, J.: Reciept-free Mix-Type Voting Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)Google Scholar
  14. 14.
    Rubin, A.: Avi Rubin’s e-voting page, http://avirubin.com/vote/
  15. 15.
    VSRW 2006 Threat Analyses for Voting System Categories (2006), http://vote.cs.gwu.edu/vsrw2006/
  16. 16.
    WOTE 2001 Workshop on Trustworthy Elections, http://www.vote.caltech.edu/wote01/
  17. 17.
    FEE2005 Workshop Frontiers in Electronic Elections, http://www.win.tue.nl/~berry/fee2005/program.html
  18. 18.
    Poulsenm, K.: E-Voting security debate comes home, http://www.securityfocus.com/news/2197
  19. 19.
    Morphy, E.: Study: Hackers Could Change E-Voting Machine Results, http://www.technewsworld.com/story/58572.html
  20. 20.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Kwangwoo Lee
    • 1
  • Yunho Lee
    • 1
  • Dongho Won
    • 1
  • Seungjoo Kim
    • 1
  1. 1.Information Security Group, School of Information and Communication EngineeringSungkyunkwan UniversitySuwon, Gyeonggi-doKorea

Personalised recommendations