Abstract
Malware on Personal Computers is a major security issue today. This fact implies that all solutions intended to secure Internet-based voting have to be re-evaluated under the assumption that a local malware application is capable of controlling the interface between user and PC. We propose to use paper-based code sheets, originally introduced by Chaum, to overcome this problem, and for the first time give a security analysis of this solution. We show that a modified, 3-step-scheme, can be considered secure against local malware attacks. Our scheme could then particulary be used to held shareholder elections or votes in an associaton over the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akkoyunlu, E.A., Ekanadham, K., Huber, R.V.: Some Constraints and Tradeoffs in the Design of Network Communications. ACM SIGOPS Operating Systems Review 9(5), 67–74 (1975)
Adida, B., Rivest, R.: Scratch & Vote. In: Proceedings of the 5th workshop on privacy in the electronic socienty, pp. 29–40 (2006)
Chaum, D.: Blind signatures for untraceable payments. In: Advances in cryptology, pp. 199–203 (1982)
Chaum, D.: Sure Vote: Technical Overview. In: Proceedings of the workshop on trustworthy elections (WOTE 2001), presentation slides (2001), http://www.vote.caltech.edu/wote01/pdfs/surevote.pdf
Chaum, D., Ryan, P., Schneider, S.: A Practical, voter-verifiable Election Scheme, Technical Report 880, School of computing science, Newcastle university (2004)
Cranor, L.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Cranor, L. (ed.) Proceedings of the Hawai’i International Conference on System Sciences (1997)
Website of the CyberVote Project, http://www.eucybervote.org
Emigh, A.: The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. A Joint Report of the US Department of Homeland Security– SRI International Identity Theft Technology Council and the Anti-Phishing Working Group
Estonia to hold world’s first Internet election, http://www.pcpro.co.uk/news/105714/estonia-to-hold-worlds-first-internet-election.html
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, Springer, Heidelberg (1993)
Gray, J.: Operating Systems. LNCS, vol. 60, pp. 393–481. Springer, Heidelberg (1978)
Grimes, R.: An SSL trojan unmasked, http://www.infoworld.com/article/06/03/03/75970_10OPsecadvise_1.html
Herschberg, M.: Secure Electronic Voting Over the World Wide Web, Master Thesis, at the Massachusetts Institute of Technology (1997), http://theory.lcs.mit.edu/~cis/voting/herschberg-thesis/index.html
Hof, S.: E-Voting an Biometric Systems? In: Proceedings Electronic Voting in Europe Technology, Law, Politics and Society. LNI P-47, pp. 63–72 (2004)
Polyas Website, Micromata Objects GmbH, http://www.polyas.de
Oppliger, R.: How to Address the Secure Platform Problem for Remote Internet Voting. In: Proceedings 5th Conf. Security in Information Systems (SIS 2002), vdf Hochschulverlag, pp. 153–173 (2002), http://www.ifi.unizh.ch/~oppliger/Docs/sis_2002.pdf
Wu, C., Sankaranarayana, R.: Internet Voting: Concerns and solutions. In: International Symposium on Cyber Worlds: Theories and Practices (2002)
http://www.theregister.co.uk/2006/05/09/botnet_master_ancheta_jailed/
Rivest, R.: Electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 243–268. Springer, Heidelberg (2002)
Rivest, R.: The ThreeBallot Voting System. unpublished draft, version 10/1/06, comments appreciated, http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Scheier, B.: Voting and Technology. Crypto-Gram (2000), http://www.schneier.com/crypto-gram-0012.html
Volkamer, M., Grimm, R.: Multiple Casts in Online Voting: Analyzing Chances. In: Electronic Voting (2006)
Weber, T.: Criminals ’may overwhelm the web, http://news.bbc.co.uk/1/hi/business/6298641.stm
Zypries: Virtual general meetings. throughout Europe enhance the rights of shareholders, http://www.bmj.de/files/-/1739/Press%20Release%20in%20english.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Helbach, J., Schwenk, J. (2007). Secure Internet Voting with Code Sheets. In: Alkassar, A., Volkamer, M. (eds) E-Voting and Identity. Vote-ID 2007. Lecture Notes in Computer Science, vol 4896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77493-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-77493-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77492-1
Online ISBN: 978-3-540-77493-8
eBook Packages: Computer ScienceComputer Science (R0)