Abstract
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Norden, L.: The machinery of democracy: Protecting elections in an electronic world. Technical report, Brennan Center Task Force on Voting System Security (October 2006), http://www.brennancenter.org/dynamic/subpages/download_file_38150.pdf
NIST: Threats to voting systems workshop (2005), http://vote.nist.gov/threats/
California Secretary of State: Top-to-bottom review (2007), http://www.sos.ca.gov/elections/elections/elections_vs.htm
Neff, C.A.: Practical high certainty intent verification for encrypted votes. VoteHere (2004), http://www.votehere.net/vhti/documentation
Adida, B., Neff, C.A.: Ballot casting assurance. In: EVT 2006: Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop, Berkeley, CA, USA, p. 7. USENIX Association (2006)
Popoveniuc, S., Hosp, B.: An introduction to Punchscan. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2006)
Fisher, K., Carback, R., Sherman, A.: Punchscan: Introduction and system definition of a high-integrity election system. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2006)
Rivest, R.: The ThreeBallot voting system. MIT (2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Adida, B., Rivest, R.L.: Scratch & Vote: Self-contained paper-based cryptographic voting. In: WPES 2006: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 29–40. ACM Press, New York (2006)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: Proc. 26th IEEE Symp. on Foundations of Comp. Science, Portland, pp. 372–382. IEEE, Los Alamitos (1985)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
The Center for Responsive Politics: Opensecrets, http://www.opensecrets.org
Kelsey, J.: Strategies for software attacks on voting machines. In: Threats to Voting Systems Workshop (2005), http://vote.nist.gov/threats/papers/stategies_for_software_attacks.pdf
Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Rivest, R., Smith, W.: Three voting protocols: ThreeBallot, VAV and Twin. In: Proceedings of USENIX/ACCURATE Electronic Voting Technology Workshop (EVT) (2007)
Strauss, C.: The trouble with triples: A critical review of the triple ballot (3ballot) scheme. part 1. Verified Voting New Mexico (2006), http://www.cs.princeton.edu/~appel/voting/Strauss-TroubleWithTriples.pdf
Strauss, C.: A critical review of the triple ballot voting system. part 2: Cracking the triple ballot encryption. draft version 1.5. Verified Voting New Mexico (2006) http://www.cs.princeton.edu/~appel/voting/Strauss-ThreeBallotCritique2v1.5.pdf
Clark, J., Essex, A., Adams, C.: On the security of ballot receipts in e2e voting systems. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2007)
Moran, T., Naor, M.: Split-ballot voting: Everlasting privacy with distributed trust. In: Proceedings of Workshop on Trustworthy Elections (WOTE) (2007)
Essex, A., Clark, J., Carback, R., Popoveniuc, S.: The Punchscan voting system: Vocomp competition submission (2007), http://www.punchscan.org/vocomp/PunchscanVocompSubmission.pdf
Moran, T., Naor, M.: Polling with physical envelopes: A rigorous analysis of a human-centric protocol. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 88–108. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kelsey, J., Regenscheid, A., Moran, T., Chaum, D. (2010). Attacking Paper-Based E2E Voting Systems. In: Chaum, D., et al. Towards Trustworthy Elections. Lecture Notes in Computer Science, vol 6000. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12980-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-12980-3_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12979-7
Online ISBN: 978-3-642-12980-3
eBook Packages: Computer ScienceComputer Science (R0)