icegov2012 proceedings
icegov2012 proceedings
icegov2012 proceedings
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
society the gap will close [2]. The most intractable issue however<br />
is the lack of privacy and protection the polling place gives to<br />
voters. Some Norwegian politicians have referred to “family<br />
voting” as a reason to abandon Internet voting altogether [11].<br />
In conclusion, it is our opinion that after a decade of<br />
experimentation Internet voting is not ready for large scale<br />
deployment yet. The different experiences presented in this paper<br />
prove the strong desire to devise solutions to the main problems.<br />
End-to-end verifiable ballots represent a key step towards<br />
independence from “absolute” security of every component of the<br />
voting chain. Significant real-world use cases like Estonian<br />
elections help bridging the gap between technology and citizens.<br />
Whether the combination of these two driving forces will be<br />
successful in producing really trustworthy systems, and in<br />
advancing awareness enough for people to properly use them, it is<br />
still very hard to foresee.<br />
4. REFERENCES<br />
[1] B. Adida. Helios: web-based open-audit voting. In SS'08:<br />
Proceedings of the 17th conference on Security symposium,<br />
pages 335-348, Berkeley, CA, USA, 2008. USENIX<br />
Association.<br />
[2] F. Belanger and L. Carter. The digital divide and internet<br />
voting acceptance. In Digital Society, 2010. ICDS '10. Fourth<br />
International Conference on, pages 307-310, Feb. 2010.<br />
[3] H. S. Berger. Testimony concerning the TGDC 2007 draft<br />
revision of the voluntary voting system guidelines. Mar. 17,<br />
2008.<br />
[4] Bishop, M., Blaze, M., Vigna, G., et al.,. University of<br />
California red team reports on voting systems, 2007.<br />
http://www.sos.ca.gov/elections/elections vsr.htm.<br />
[5] California Internet Voting Task Force (California Secretary of<br />
State). A report on the feasibility of internet voting, Jan 2000.<br />
http://www.ss.ca.gov/executive/ivote.<br />
[6] R. Carback, D. Chaum, J. Clark, J. Conway, A. Essex, P. S.<br />
Herrnson, T. Mayberry, S. Popoveniuc, R. L. Rivest, E. Shen,<br />
A. T. Sherman, and P. L. Vora. Scantegrity II municipal<br />
election at Takoma Park: The first e2e binding governmental<br />
election with ballot privacy. In USENIX Security Symposium,<br />
pages 291-306. USENIX Association, 2010.<br />
[7] D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, A.<br />
Sherman, and P. Vora. Scantegrity: End-to-end voter-verifiable<br />
optical-scan voting. Security & Privacy, IEEE, 6(3):40-46,<br />
May-June 2008.<br />
[8] Council of Europe. Recommendation Rec (2004) 11. Council of<br />
Europe, 2004.<br />
[9] Federal Voting Assistance Program. The uniformed and<br />
overseas citizens absentee voting act overview.<br />
http://www.fvap.gov/reference/laws/uocava.html.<br />
[10] S. Heiberg, P. Laud, and J. Willemson. The application of ivoting<br />
for Estonian parliamentary elections of 2011. In<br />
Proceedings of the Third VOTE-ID International Conference,<br />
Sep. 2011.<br />
61<br />
[11] K. Hole and L. Nestas. Building and maintaining trust in<br />
internet voting. Computer, PP(99):1, 2012.<br />
[12] D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner.<br />
Security Analysis of the Secure Electronic Registration and<br />
Voting Experiment (SERVE). Aug. 2004.<br />
[13] R. Krimmer, S. Triessnig, and M. Volkamer. The<br />
development of remote e-voting around the world: a review<br />
of roads and directions. In Proceedings of the 1 st<br />
International Conference on E-voting and Identity, VOTE-<br />
ID'07, pages 1-15, Berlin, Heidelberg, 2007. Springer-<br />
Verlag.<br />
[14] M. Lesk. The new front line: Estonia under cyberassault.<br />
Security & Privacy, IEEE, 5(4):76-79, July-Aug. 2007.<br />
[15] M. McGaley and J. P. Gibson. A critical analysis of the<br />
Council of Europe recommendations on e-voting. In<br />
Proceedings of the 2006 USENIX/Accurate Electronic Voting<br />
Technology Workshop, 2006.<br />
[16] J. Mohen and J. Glidden. The case for internet voting.<br />
Commun. ACM, 44(1):72-85, Jan. 2001.<br />
[17] H. Pardue, A. Yasinsac, and J. Landry. Towards internet<br />
voting security: A threat tree for risk assessment. In Risks<br />
and Security of Internet and Systems (CRiSIS), 2010 Fifth<br />
International Conference on, pages 1-7, Oct. 2010.<br />
[18] S. Peisert, M. Bishop, and A. Yasinsac. Vote selling, voter<br />
anonymity, and forensic logging of electronic voting<br />
machines. In HICSS, pages 1-10. IEEE Computer Society,<br />
2009.<br />
[19] D. M. Phillips and H. A. von Spakovsky. Gauging the risks<br />
of internet elections. Commun. ACM, 44(1):73-85, Jan. 2001.<br />
[20] M. Prandini and M. Ramilli. Taking the best of both worlds:<br />
A comparison and integration of the U.S. and EU approaches<br />
to e-voting systems evaluation. In HICSS, pages 1-10. IEEE<br />
Computer Society, 2011.<br />
[21] G. Schryen and E. Rich. Security in large-scale internet<br />
elections: A retrospective analysis of elections in Estonia,<br />
The Netherlands, and Switzerland. Information Forensics<br />
and Security, IEEE Transactions on, 4(4):729-744, Dec.<br />
2009.<br />
[22] Technical Guidelines Development Committee, editor.<br />
Voluntary Voting System Guidelines Recommendations to the<br />
Election Assistance Commission. U.S. Election Assistance<br />
Commission, Aug. 2007.<br />
[23] M. Volkamer, O. Spycher, and E. Dubuis. Measures to<br />
establish trust in internet voting. In Proceedings of the 5 th<br />
International Conference on Theory and Practice of<br />
Electronic Governance, ICEGOV '11, pages 1-10, New York,<br />
NY, USA, 2011. ACM.<br />
[24] D. Wagner. Joint hearing of the house committee on science<br />
and the committee on house administration. Testimony on<br />
voting system standards. July 19, 2006.