Abstract
We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the voting system. The scheme also seeks to make the voter interface as familiar as possible.
Keywords
- Candidate List
- Bulletin Board
- Voter Choice
- Error Handling
- Visual Cryptography
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This work was partially funded by the EPSRC DIRC project, www.dirc.org.uk.
Chapter PDF
References
Brumbaugh, R.S.: Ancient Greek Gadgets and Machines. Thomas Y. Crowell (1966)
Bryans, J.W., Ryan, P.Y.A.: A Dependability Analysis of the Chaum Voting Scheme. Technical Report CS-TR-809, University of Newcastle (2003)
Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy 2(1), 38–47 (2004)
Jakobsson, M., Juels, M., Rivest, R.: Making Mix Nets Robust for Electronic Voting by Randomised Partial Checking. In: USENIX 2002 (2002)
Mercuri, R.: A better ballot box? IEEE Spectrum 39(10) (2002)
Andrew Neff, C.: A verifiable secret shuffle and its application to e-voting. In: ACM-CCS (2001)
Ryan, P.Y.A.: A Variant of the Chaum Voter-Verifiable Scheme. Technical Report CS-TR 864, University of Newcastle, 2004, Also in WITS 2005: Workshop on Issues in the Theory of Security
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chaum, D., Ryan, P.Y.A., Schneider, S. (2005). A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P., Gollmann, D. (eds) Computer Security – ESORICS 2005. ESORICS 2005. Lecture Notes in Computer Science, vol 3679. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11555827_8
Download citation
DOI: https://doi.org/10.1007/11555827_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28963-0
Online ISBN: 978-3-540-31981-8
eBook Packages: Computer ScienceComputer Science (R0)