Abstract
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting concept using the Internet as the voting channel. The concept introduced is based on Austrian e-Government elements and the Austrian identity management concept in particular. As a result, this paper presents a novel approach of building an e-voting system relying on two core principles: strong end-to-end encryption and stringent identity domain separation.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
European Commission for Democracy through Law (Venice Commission). Code of Good Practice in Electoral Matters (October 2002)
Council of Europe Committee of Ministers. Recommendation Rec(2004)11 of the Committee of Ministers to member states on legal, operational and technical standards for e-voting. Council of Europe (September 2004)
Multidisciplinary Ad Hoc Group of Specialists (IP1-S-EE). Explanatory Memorandum to the Draft Recommendation Rec(2004) of the Committee of Ministers to member states on legal, operational and technical standards for e-voting. Council of Europe (September 2004)
Working-Group “E-Voting”. Abschlussbericht zur Vorlage an Dr. Ernst Strasser, Bundesminister für Inneres (November 2004)
Rössler, T.: Electronic Voting over the Internet – an E-Government Speciality. PHD-Thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria (September 2007)
Council of Europe. Convention for the Protection of Human Rights and Fundamental Freedoms (November 1950)
Bundesamt für Sicherheit in der Informationstechnik. Basissatz von Sicherheitsanforderungen an Onlinewahlprodukte (Version 0.18) (May 2007)
Gesellschaft für Informatik e.V (GI). GI-Anforderungen an Internetbasierte Vereinswahlen (August 2005)
Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A security analysis of the secure electronic registration and voting experiment (serve) (January 2004)
Rössler, T., Hayat, A., Posch, R., Leitold, H.: Giving an interoperable solution for incorporating foreign eids in austrian e-government. In: Proceedings of IDABC Conference 2005, March 2005, pp. 147–156. European Commission (2005)
Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 372–382. IEEE, Los Alamitos (1985)
Cohen, J., Yung, M.: Distributing the power of government to enhance the privacy of voters. In: Proceedings of 5th ACM Symposium on Principles of Distributed Computing (PODC), pp. 52–62. ACM, New York (1986)
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
Chaum, D.: Untraceable electronic mail, return adresses, and digital pseudonyms. Communications of the ACM 24(2), 84–86 (1981)
Juang, W.-S., Lei, C.-L.: A collision free secret ballot protocol for computerized general elections. Computers and Security 15(4), 339–348 (1996)
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 539. Springer, Heidelberg (2000)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Okamoto, T.: Receipt free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)
Leitold, H., Hollosi, A., Posch, R.: Security architecture of the austrian citizen card concept. In: Proceedings of ACSAC 2002, Las Vegas, December 9-13, pp. 391–400. IEEE Computer Society, Los Alamitos (2002)
Hollosi, A., Hörbe, R.: Bildung von Stammzahl und bereichsspezifischem Personenkennzeichen (SZ-bPK-Algo -1.1.1). Platform Digital Austria, AG Bürgerkarte (January 2006), http://www.ref.gv.at (as seen on May 12, 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rössler, T. (2009). Electronic Voting Using Identity Domain Separation and Hardware Security Modules. In: Godart, C., Gronau, N., Sharma, S., Canals, G. (eds) Software Services for e-Business and e-Society. I3E 2009. IFIP Advances in Information and Communication Technology, vol 305. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04280-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-04280-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04279-9
Online ISBN: 978-3-642-04280-5
eBook Packages: Computer ScienceComputer Science (R0)