Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting

  • Oliver Spycher
  • Melanie Volkamer
  • Reto Koenig
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7187)


The short history of e-voting has shown that projects are doomed to fail in the absence of trust among the electorate. The first binding Norwegian Internet elections are scheduled for fall 2011. Notably, transparency is taken as a guideline in the project. This article discusses transparency and other measures the Norwegians apply that are suited to establish profound trust, i.e. trust that grounds on the system’s technical features, rather than mere assertions. We show whether at all, how and to which degree these measures are implemented and point out room for enhancements. We also address general challenges of projects which try to reach a high level of transparency for others as lessons learned.


Trust Establishment Test Election Electronic Vote Eligible Voter Vote Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Common Criteria for Information Technology Security Evaluation. Version 3.1, Revision 3, Final (July 2009), (retrieved: June 07, 2011)
  2. 2.
  3. 3.
    E-valg 2011 (krd_evalg2011) on twitter @ONLINE (July 2012),
  4. 4.
    e-valgbloggen @ONLINE (June 2011),
  5. 5.
  6. 6.
  7. 7.
  8. 8.
    Election administration software according to eal2 @ONLINE (June 2011),
  9. 9.
    Electronic counting of paper votes software according to eal2 @ONLINE (June 2011),
  10. 10.
    Electronic voting software according to eal4+ @ONLINE (June 2011),
  11. 11.
  12. 12. @ONLINE (June 2011),
  13. 13.
    Specification, tenders, evaluation and contract @ONLINE (May 2011),
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Threat assessment summary e-voting, admin, and pvoting toe’s @ONLINE (May 2011),
  18. 18.
    Allepuz, J.P., Castelló, S.G.: Universally verifiable efficient re-encryption mixnet. In: Electronic Voting, pp. 241–254 (2010)Google Scholar
  19. 19.
    Directorate general of democracy and politcal affairs: Guidelines on transparency of e-enabled elections. GGIS (2010) 5 E, Council of Europe (2010)Google Scholar
  20. 20.
    Gharadaghy, R., Volkamer, M.: Verifiability in electronic voting - explanations for non security expert. In: Krimmer, R., Grimm, R. (eds.) Electronic Voting 2010 - 4th International Conference. LNI, vol. 167, pp. 151–162. Gesellschaft für Informatik, Bonn (2010)Google Scholar
  21. 21.
    Gjøsteen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010/380 (2010),
  22. 22.
    Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols (2010)Google Scholar
  23. 23.
    Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)Google Scholar
  24. 24.
    Volkamer, M.: Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities. LNBIP, vol. 30. Springer (2009)Google Scholar
  25. 25.
    Volkamer, M., Grimm, R.: Determine the Resilience of Evaluated Internet Voting Systems. In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, pp. 47–54. IEEE CS Digital Library (2009), doi:10.1109/RE-VOTE.2009.2Google Scholar
  26. 26.
    Volkamer, M., Schryen, G., Langer, L., Schmidt, A., Buchmann, J.: Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI). LNI, vol. 154, pp. 1827–1836. Gesellschaft für Informatik, Bonn (2009)Google Scholar
  27. 27.
    Volkamer, M., Spycher, O., Dubuis, E.: Measures to establish trust in internet voting. In: ICEGOV. ACM International Conference Proceeding Series. ACM (2011)Google Scholar
  28. 28.
    Volkamer, M., Vogt, R.: Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte (BSI-PP-0037), common Criteria Protection Profile (2008),

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Oliver Spycher
    • 1
    • 2
  • Melanie Volkamer
    • 3
  • Reto Koenig
    • 1
    • 2
  1. 1.Bern University of Applied SciencesBielSwitzerland
  2. 2.University of FribourgFribourgSwitzerland
  3. 3.TU Darmstadt, CASEDDarmstadtGermany

Personalised recommendations