Skip to main content

Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting

  • Conference paper
E-Voting and Identity (Vote-ID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7187))

Included in the following conference series:

Abstract

The short history of e-voting has shown that projects are doomed to fail in the absence of trust among the electorate. The first binding Norwegian Internet elections are scheduled for fall 2011. Notably, transparency is taken as a guideline in the project. This article discusses transparency and other measures the Norwegians apply that are suited to establish profound trust, i.e. trust that grounds on the system’s technical features, rather than mere assertions. We show whether at all, how and to which degree these measures are implemented and point out room for enhancements. We also address general challenges of projects which try to reach a high level of transparency for others as lessons learned.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Common Criteria for Information Technology Security Evaluation. Version 3.1, Revision 3, Final (July 2009), http://www.commoncriteriaportal.org/cc/ (retrieved: June 07, 2011)

  2. About the e-vote project @ONLINE (May 2011), http://www.regjeringen.no/en/dep/krd/prosjekter/e-vote-2011-project.html?id=597658

  3. E-valg 2011 (krd_evalg2011) on twitter @ONLINE (July 2012), http://www.regjeringen.no/pages/16539918/03SystemArchitecture-Evote.pdf

  4. e-valgbloggen @ONLINE (June 2011), http://www.e-valgbloggen.no/

  5. E-valglosningen @ONLINE (June 2011), http://www.regjeringen.no/nb/dep/krd/prosjekter/e-valg-2011-prosjektet/e-valgsystemet1.html?id=597799

  6. E-vote 2011-project @ONLINE (May 2011), http://www.regjeringen.no/en/dep/krd/prosjekter/e-vote-2011-project.html?id=597658

  7. e-vote 2011 security objectives @ONLINE (May 2011), http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e-valg/tekniskdok/Security_Objectives_v2.pdf

  8. Election administration software according to eal2 @ONLINE (June 2011), http://www.regjeringen.no/pages/16539918/SecurityTargetforElectionadministrationsoftwarev1_0.pdf

  9. Electronic counting of paper votes software according to eal2 @ONLINE (June 2011), http://www.regjeringen.no/pages/16539918/SecurityTargetfore-countingofp-votesv1_0.pdf

  10. Electronic voting software according to eal4+ @ONLINE (June 2011), http://www.regjeringen.no/pages/16539918/SecurityTargetforElectronicVotingSoftware.pdf

  11. Minid @ONLINE (June 2011), http://minid.difi.no/minid/minid.php?lang=en

  12. source.evalg.stat.no @ONLINE (June 2011), https://source.evalg.stat.no

  13. Specification, tenders, evaluation and contract @ONLINE (May 2011), http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e-valg/tekniskdok/Security_Objectives_v2.pdf

  14. System requirements specification @ONLINE (May 2011), http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e-valg/Anskaffelse/System_Requirements_Specification1.pdf

  15. Systemarkitektur @ONLINE (June 2011), http://www.regjeringen.no/nb/dep/krd/prosjekter/e-valg-2011-prosjektet/kildekode/dokument.html?id=645240

  16. Technical documents @ONLINE (May 2011), http://www.regjeringen.no/en/dep/krd/prosjekter/e-vote-2011-project/technical-documents.html?id=612104

  17. Threat assessment summary e-voting, admin, and pvoting toe’s @ONLINE (May 2011), http://www.regjeringen.no/pages/16539918/ThreatAssessmentSummary.pdf

  18. Allepuz, J.P., Castelló, S.G.: Universally verifiable efficient re-encryption mixnet. In: Electronic Voting, pp. 241–254 (2010)

    Google Scholar 

  19. Directorate general of democracy and politcal affairs: Guidelines on transparency of e-enabled elections. GGIS (2010) 5 E, Council of Europe (2010)

    Google Scholar 

  20. Gharadaghy, R., Volkamer, M.: Verifiability in electronic voting - explanations for non security expert. In: Krimmer, R., Grimm, R. (eds.) Electronic Voting 2010 - 4th International Conference. LNI, vol. 167, pp. 151–162. Gesellschaft für Informatik, Bonn (2010)

    Google Scholar 

  21. Gjøsteen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010/380 (2010), http://eprint.iacr.org/

  22. Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols (2010)

    Google Scholar 

  23. Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)

    Google Scholar 

  24. Volkamer, M.: Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities. LNBIP, vol. 30. Springer (2009)

    Google Scholar 

  25. Volkamer, M., Grimm, R.: Determine the Resilience of Evaluated Internet Voting Systems. In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, pp. 47–54. IEEE CS Digital Library (2009), doi:10.1109/RE-VOTE.2009.2

    Google Scholar 

  26. Volkamer, M., Schryen, G., Langer, L., Schmidt, A., Buchmann, J.: Elektronische Wahlen: Verifizierung vs. Zertifizierung. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI). LNI, vol. 154, pp. 1827–1836. Gesellschaft für Informatik, Bonn (2009)

    Google Scholar 

  27. Volkamer, M., Spycher, O., Dubuis, E.: Measures to establish trust in internet voting. In: ICEGOV. ACM International Conference Proceeding Series. ACM (2011)

    Google Scholar 

  28. Volkamer, M., Vogt, R.: Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte (BSI-PP-0037), common Criteria Protection Profile (2008), http://www.bsi.de/cc/pplist/pplist.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Spycher, O., Volkamer, M., Koenig, R. (2012). Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32747-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32746-9

  • Online ISBN: 978-3-642-32747-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics