loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Stefan Popoveniuc 1 ; John Kelsey 2 and Eugen Leontie 3

Affiliations: 1 KT Consulting, United States ; 2 NIST, United States ; 3 The George Washington University, United States

Keyword(s): Voting, Privacy, Blind signature.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Information Hiding ; Personal Data Protection for Information Systems ; Privacy

Abstract: Electronic poll books can rapidly check the eligibility of a voter due to their ability to quickly search lists. However, they also introduce a factor of concern: if the electronic poll book records the order of sign-ins and the voting machine or optical scanner records the order in which the voters cast their ballots, ballot secrecy can be compromised. Worse, if the time at which each voter signs-in and the time at which each ballot is cast are recorded, ballot secrecy is lost. It is surprisingly difficult to avoid saving such timing information, for example in event logs, and even more difficult to verify that no such information is saved. In addition, due to operational complexities, even the more efficient electronic poll books can act as a bottleneck in the voting process. We propose a simple technique to address these concerns, by allowing voters to sign-in from home, and print out a bar-coded ticket to be presented at the check-in table. Using blind signatures, this ticket nee d not reveal information on the voter’s identity to the check-in table at the precinct. The ticket proves than the voter is authorized to vote on a particular ballot style without disclosing her identity. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.211.148.68

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Popoveniuc, S.; Kelsey, J. and Leontie, E. (2011). ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT; ISBN 978-989-8425-71-3; ISSN 2184-3236, SciTePress, pages 281-286. DOI: 10.5220/0003520202810286

@conference{secrypt11,
author={Stefan Popoveniuc. and John Kelsey. and Eugen Leontie.},
title={ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT},
year={2011},
pages={281-286},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003520202810286},
isbn={978-989-8425-71-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2011) - SECRYPT
TI - ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS
SN - 978-989-8425-71-3
IS - 2184-3236
AU - Popoveniuc, S.
AU - Kelsey, J.
AU - Leontie, E.
PY - 2011
SP - 281
EP - 286
DO - 10.5220/0003520202810286
PB - SciTePress