-
Tor is not enough: Coercion in Remote Electronic Voting Systems
Authors:
Christian Meter,
Alexander Schneider,
Philipp Hagemeister,
Martin Mauve
Abstract:
Current electronic voting systems require an anonymous channel during the voting phase to prevent coercion. Typically, low-latency anonymization-networks like Tor are used for this purpose. In this paper we devise a monitoring attack that allows an attacker to monitor whether participants of an election voted, despite the use of a low-latency network during the voting phase, thereby breaking an im…
▽ More
Current electronic voting systems require an anonymous channel during the voting phase to prevent coercion. Typically, low-latency anonymization-networks like Tor are used for this purpose. In this paper we devise a monitoring attack that allows an attacker to monitor whether participants of an election voted, despite the use of a low-latency network during the voting phase, thereby breaking an important part of coercion-freeness. We implement a simulation carrying out our attack and measure its success rates.
△ Less
Submitted 9 February, 2017;
originally announced February 2017.
-
Survey on Remote Electronic Voting
Authors:
Alexander Schneider,
Christian Meter,
Philipp Hagemeister
Abstract:
Electronic and remote voting has become a large field of research and brought forth a multiplicity of schemes, systems, cryptographic primitives as well as formal definitions and requirements for electronic elections. In this survey we try to give a brief and precise overview and summary of the current situation.
Electronic and remote voting has become a large field of research and brought forth a multiplicity of schemes, systems, cryptographic primitives as well as formal definitions and requirements for electronic elections. In this survey we try to give a brief and precise overview and summary of the current situation.
△ Less
Submitted 9 February, 2017;
originally announced February 2017.
-
Design of Distributed Voting Systems
Authors:
Christian Meter
Abstract:
Countries like Estonia, Norway or Australia developed electronic voting systems, which could be used to realize parliamentary elections with the help of personal computers and the Internet. These systems are completely different in their design and their way to solve the same problem. In this thesis, we analyze some of the largest real-world systems, describe their building blocks and their genera…
▽ More
Countries like Estonia, Norway or Australia developed electronic voting systems, which could be used to realize parliamentary elections with the help of personal computers and the Internet. These systems are completely different in their design and their way to solve the same problem. In this thesis, we analyze some of the largest real-world systems, describe their building blocks and their general design to focus on possible problems in these electronic voting systems.
Furthermore, we present a template for an e-voting system, which we designed to try to fulfill the preliminaries and requirements of a secure electronic voting system. We use the experiences and the building blocks of existing systems to combine them to another more secure system. Afterwards, we compare our concept with real-world systems to evaluate the fulfillments of the requirements. Conclusively, we discuss the occurring problems when designing a secure system.
Peer-to-peer networks provide many advantages, like decentralization, which might be applicable to electronic voting systems. Therefore, we take a look on the distributed database called blockchain and the usage in a peer-to-peer voting system. Our contribution to this topic is a modification of the proof-of-stake, which enables the usage of common devices, like smartphones or tablets, for the blockchain verification and inclusion of new ballots to the chain. This proof does not need much computing power and has a lower carbon footprint than the proof-of-work in the Bitcoin protocol.
△ Less
Submitted 8 February, 2017;
originally announced February 2017.