A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities

Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza

Abstract

This paper introduces a new Internet voting (i-voting) system based on an analysis of the related literature, oriented to democratic election principles (universality, equality, freedom and secrecy). The foundations compiled from that analysis include both technical and social aspects because achieving voter confidence is as important as creating “perfectly secure” systems when talking about democracy. The issues especially addressed in the new system are: full audit-capability, secure individual verification and vote-complaining, and N-Version Programming based robustness and transparency. Currently, this new i-voting system is being tested for performance and usability in our lab.

References

  1. United Nations, 1966. International Covenant on Civil and Political Rights, art. 25 sect. B. Available from: http://www.hrweb.org/legal/cpr.html. [5 March 2013].
  2. Council of Europe 2004. Recommendation, Rec(2004)11. Available from: https://wcd.coe.int/ViewDoc.jsp? id=778189. [5 March 2013].
  3. Chaum, D., 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, vol. 24, n. 2, pp. 84-90.
  4. Benaloh, J., 1987. Verifiable secret-ballot election. Yale University USA, PhD. Thesis.
  5. Fujioka, A., Okamoto, T., Ohta, K., 1993. A Practical Secret Voting Scheme for Large Scale Elections. In: AUSCRYPT'92, vol. 718, pp. 244-251.
  6. Benaloh, J., Tuinstra, D., 1994. Receipt-Free Secret-Ballot Elections (Extended Abstract). In: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pp. 544-553.
  7. Sako, K., Kilian, J., 1994. Secure Voting Using Partially Compatible Homomorphisms. In: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, vol. 839, pp. 411-424.
  8. Cranor, L. F., Cytron, R. K., 1997. Sensus: A SecurityConscious Electronic Polling System for the Internet. In: Proceedings of the Hawaii International Conference on System Sciences, pp. 561-571.
  9. Cramer R., Franklin, M., Schoemakers B., Yung, M., 1996. Multi-authority secret ballot elections with linear work. In: Advances in Cryptology - EUROCRYPT'96, vol. 1070, pp. 72-83.
  10. Riera, A., Borrell, J., Rifá, J., 1998. An uncoercible verifiable electronic voting protocol. In: Proceedings of the IFIP TC11 14th International Conference on Information Security SEC'98, pp. 349-362.
  11. Karro, J., Wang, J., 1999. Towards a Practical, Secure, and Very Large Scale Online Election. In: Proceedings of the 15th ACSAC, pp. 161-169.
  12. DuRette, B. W., 1999. Multiple Administrators for Electronic Voting. MIT USA. Bachelor's thesis. Available from: http://groups.csail.mit.edu/ cis/theses/DuRette-bachelors.pdf. [5 March 2013].
  13. Ohkubo, M., Miura, F., Abe, M., Fujioka, A., Okamoto, T., 1999. An Improvement on a Practical Secret Voting Scheme. In: Proceedings of the Second International Workshop on Information Security, pp. 225-234.
  14. Schoenmakers, B., 2000. Fully Auditable Electronic Secret-Ballot Elections. Available from: http:// www.xootic.nl/magazine/jul-2000/schoenmakers.pdf. [5 March 2013].
  15. Carracedo, J., Gómez, A., Moreno, J., Pérez E., 2002. Votación electrónica basada en criptografía avanzada (Proyecto VOTESCRYPT). Available from: http:// vototelematico.diatel.upm.es/articulos/articulo_venezu ela_revisado.pdf. [5 March 2013].
  16. Joaquim, R., Zúquete, A., Ferreira, P., 2003. REVS- A Robust Electronic Voting System. In: Proceedings of IADIS International Conference e-Society, pp. 95-103.
  17. Selker, T., Goler, J., 2004. The SAVE system - secure architecture for voting electronically. BT Technology Journal, vol. 22, iss. 4, pp. 89-95.
  18. Morales-Rocha, V., Soriano, M., Martínez-Peláez, R., Rico, F., 2008. New multi-channel voting scheme: towards remote e-voting over the internet. International Journal of Electronic Governance, vol. 1 n. 2, pp. 155-173.
  19. Chaum, D., 1983. Blind Signatures for untraceable payments. In: Advances in Cryptology - Crypto 7882, pp. 199-203.
  20. Bundesamt für Sicherheit in der Informationstechnik, 2008. Common Criteria Protection Profile for Basic set of security requirements for Online Voting Products; BSI-CC-PP-0037, v1.0, 18, Bonn.
  21. Kremer, S., Ryan, M., 2005. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Proc. 14th European Symposium On Programming (ESOP'05), pp. 186-200.
  22. Blanchet, B. ProVerif. Available from: http:// proverif.inria.fr/.[5 March 2013].
Download


Paper Citation


in Harvard Style

Huarte M., Goirizelaia I., José Unzilla J., Matías J. and J. Igarza J. (2013). A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 395-402. DOI: 10.5220/0004529803950402


in Bibtex Style

@conference{secrypt13,
author={Maider Huarte and Iñaki Goirizelaia and Juan José Unzilla and Jon Matías and Juan J. Igarza},
title={A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={395-402},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004529803950402},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities
SN - 978-989-8565-73-0
AU - Huarte M.
AU - Goirizelaia I.
AU - José Unzilla J.
AU - Matías J.
AU - J. Igarza J.
PY - 2013
SP - 395
EP - 402
DO - 10.5220/0004529803950402