An End to End Verifiability Proposal for the OTP-Vote Electronic Voting Model
Downloads
Electronic voting systems have generated significant controversy in contemporary society due to the mistrust of the electorate. This mistrust is often rooted in the perceived inability to audit these systems with the same rigor and transparency as widely known and utilized manual voting methods. A critical requirement imposed on electronic voting systems is the capacity to ensure vote traceability without compromising voter anonymity—a complex challenge that presents significant difficulties. This study introduces an end-to-end verifiability (E2EV) proposal for the OTP Vote electronic voting model. The research examines this model through the lens of three essential criteria: individual verifiability, universal verifiability, and ballot secrecy. By analyzing these aspects, we aim to address the prevalent mistrust and contribute to the ongoing discourse surrounding the security and reliability of electronic voting systems.
M. McGaley & J. Gibson, “A critical analysis of the council of Europe recommendations on e-voting”, In Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop EVT’06, USENIX Association, pp. 1–13, 2006.
D. Chaum, “Secret-ballot receipts: True voter-verifiable elections”, IEEE Security & Privacy, 2(1), pp 38–47, 2004.
P. Ryan, “A variant of the Chaum voter-verifiable scheme”. In Proceedings of the 2005 Workshop on Issues in the Theory of Security pp. 81-88, 2005.
D. Chaum, P. Ryan & S. Schneider. “A practical voter-verifiable election scheme”. In Computer Security–ESORICS 2005: 10th European Symposium on Research in Computer Security. Proceedings 10 (pp. 118-139). Springer Berlin Heidelberg. 2005.
K. Fisher, R. Carback, & A. Sherman. “Punchscan: Introduction and system definition of a high-integrity election system”. In Proceedings of Workshop on Trustworthy Elections, pages 19–29, 2006.
D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc, A. Sherman & P. Vora, P., “Scantegrity: End-to-end voter-verifiable optical-scan voting”. IEEE Security & Privacy, 6(3), 40-46, 2008.
D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. Rivest, P. Ryan, E. Shen, A. Sherman & P. Vora, “Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes”. IEEE transactions on information forensics and security, 4(4), 611-627, 2009.
B. Adida & R. Rivest. “Scratch & vote: self-contained paper-based cryptographic voting”. In Proceedings of the 5th ACM workshop on Privacy in electronic society. pp. 29-40, 2006.
J. Benaloh, M. Byrne, P. Kortum, N. McBurnett, O. Pereira, P. Stark & D. Wallach, D., “STAR-Vote: A secure, transparent, auditable, and reliable voting system”. arXiv preprint arXiv:1211.1904, 2012.
B. Adida, “Helios: Web-based Open-Audit Voting”. In USENIX security symposium. Vol. 17, pp. 335-348, 2008.
A. Kiayias, M. Korman and D. Walluck, “An Internet Voting System Supporting User Privacy”, In 22nd Annual Computer Security Applications Conference (ACSAC'06), pp. 165-174, 2006.
S. Bast, S, Confidencialidad e Integridad de Datos en Sistemas de E-Voting: un Modelo para la Implementación Segura de un Sistema de Voto Electrónico Presencial. Editorial Académica Española. 2017.
P.García, J. van de Graaf, G. Montejano, S. Bast & O. Testa, “Implementación de canales paralelos en un protocolo Non Interactive Dining Cryptographers”. In XLIII Jornadas Argentinas de Informática e Investigación Operativa (43JAIIO)-VI Workshop de Seguridad Informática. pp 1-15, 2014.
C. Shannon, “Communication theory of secrecy systems”. The Bell system technical journal, 28(4), 656-715, 1949.
P. García, J. van de Graaf, A. Hevia & A. Viola, “Beating the birthday paradox in dining cryptographer networks”. In Progress in Cryptology-LATINCRYPT 2014: Third International Conference on Cryptology and Information Security in Latin America. Revised Selected Papers 3 (pp. 179-198). Springer International Publishing (2015).
P. Garcia, J. van de Graaf, G. Montejano, D. Riesco, N. Debnath and S. Bast, “Storage Optimization for Non Interactive Dining Cryptographers (NIDC)”. In 12th International Conference on Information Technology - New Generations, pp. 55-60, 2015
P. García, S. Bast, E. Fritz, G. Montejano, D. Riesco & N. Debnath, “A systematic method for choosing optimal parameters for storage in parallel channels of slots”. In 2016 IEEE International Conference on Industrial Technology (ICIT), pp. 1700-1705, 2016.
S. Bast, P: García, G. Montejano, “Generación de Códigos para OTP Vote”. In 5º Congreso Nacional de Ingeniería Informática/ Sistemas de Información (CoNaIISI). ISSN: 2347-0372. pp. 12-22. (2017)
P. García, S. Bast & G. Montejano, “Recuento y recuperación de sufragios en OTP–Vote”. In XI Simposio Argentino de Informática en el Estado (SIE)-JAIIO 46 pp 38-51 (2017).
.J. Benaloh, R. Rivest, P. Ryan, P. Stark, V. Teague, & P. Vora, P. (2015). “End-to-end verifiability”. arXiv preprint arXiv:1504.03778 (2015).
S. Bast, G. Montejano, M. Berón, “Verificabilidad End to End y Secreto de Voto en el Modelo OTP – Vote”. In 10 º Congreso Nacional de Ingeniería en Informática / Sistemas de Información, (CoNaIISI). ISBN 978-950-42-0218-9. . pp. 534-544. (2022)