Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: 'Fundamentals' provides an introduction to the relevant issues of electronic voting. 'Requirements' contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. 'Evaluation' presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, 'Application' describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a 'Protection Profile for a Basic Set of Security Requirements for Online Voting Products', which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.
Cited By
- Schläpfer M and Volkamer M The secure platform problem taxonomy and analysis of existing proposals to address this problem Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, (410-418)
- Volkamer M, Spycher O and Dubuis E Measures to establish trust in internet voting Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, (1-10)
- Bulens P, Giry D and Pereira O Running mixnet-based elections with Helios Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections, (6-6)
Index Terms
- Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
Recommendations
Developing a Legal Framework for Remote Electronic Voting
VOTE-ID '09: Proceedings of the 2nd International Conference on E-Voting and IdentityThis paper describes how to legally regulate remote electronic elections. Electronic voting systems have to respect the constitutional election principles. For technological solutions, this translates into security requirements that have to be fulfilled ...
An Anonymous Electronic Voting Protocol for Voting Over The Internet
WECWIS '01: Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01)Abstract: In this work we propose a secure electronic voting protocol that is suitable for large scale voting over the Internet. The protocol allows a voter to cast his or her ballot anonymously, by exchanging untraceable yet authentic messages. The ...
New Research Results for Electronic Voting
Voting systems have become controversial in the years following the multiple election disasters that occurred in the United States during and after 2000. Of particular note were the electronic voting (e-voting) systems that were widely deployed to ...