Universally Composable NIZK Protocol in an Internet Voting Scheme

Author(s):  
Md. Abdul Based ◽  
Stig Frode Mjølsnes

2021 ◽  
Vol 28 (5) ◽  
pp. 1-36
Author(s):  
Karola Marky ◽  
Marie-Laure Zollinger ◽  
Peter Roenne ◽  
Peter Y. A. Ryan ◽  
Tim Grube ◽  
...  

Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning voting infrastructure. Individual verifiability aims to protect against such risks by letting voters verify that their votes are correctly registered in the electronic ballot box. Therefore, voters need to carry out additional tasks making human factors crucial for security. In this article, we establish a categorization of individually verifiable Internet voting schemes based on voter interactions. For each category in our proposed categorization, we evaluate a voting scheme in a user study with a total of 100 participants. In our study, we assessed usability, user experience, trust, and further qualitative data to gain deeper insights into voting schemes. Based on our results, we conclude with recommendations for developers and policymakers to inform the choices and design of individually verifiable Internet voting schemes.



Author(s):  
Jurlind Budurushi ◽  
Stephan Neumann ◽  
Maina M. Olembo ◽  
Melanie Volkamer




Author(s):  
Stephan Neumann ◽  
Melanie Volkamer

The foundations of democratic societies are elections. Due to their central importance to society, elections are bound to high legal standards, which are usually specified as election principles in national constitutions. To date, technological advance has reached elections, and Internet voting is a buzzword in the field of information technology. Many Internet voting systems and schemes have been proposed in research and some have even been used in legally binding elections. However, their underlying requirements are on the one hand often too closely linked to the specific technology and on the other hand mostly tailored to the scheme/system under investigation and therefore not connectable with election principles. This makes it difficult to compare different schemes/systems with each other, and correspondingly, it is difficult for election officials to select one of the proposed Internet voting schemes/systems for their own election setting. This chapter counters this artifact with two contributions, which are captured within an evaluation framework. First, based on the interdisciplinary method KORA, the authors derive constitutionally founded technical requirements. Second, they propose metrics to estimate the fulfillment of these requirements within concrete Internet voting systems. Given these contributions, the framework developed within this chapter supports election officials in making justified decisions about the selection and deployment of a specific Internet voting scheme/system.



Author(s):  
Sven Heiberg ◽  
Tarvi Martens ◽  
Priit Vinkel ◽  
Jan Willemson


2008 ◽  
Vol 28 (5) ◽  
pp. 1335-1337
Author(s):  
Dong-liang GUO


Author(s):  
Karola Marky ◽  
Verena Zimmermann ◽  
Markus Funk ◽  
Jörg Daubert ◽  
Kira Bleck ◽  
...  
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document