Abstract | ||
---|---|---|
In the past, researchers have proposed manyvoting schemes that satisfy a wide range of security properties. These schemes often rely on strong trust assumptionsand do not consider the voter sufficiently, which currentlyrenders them inappropriate for usage in real-world elections. In this paper we focus on the voting scheme Civitas, whichfeatures provably strong security properties, such as end-toend verifiability and coercion-resistance. We identify the strongtrust assumptions and usability weaknesses of the scheme, which currently prevent its usage in real-world elections. Basedon these results, we show how most of these strong trustassumptions can be implemented, e.g., by using eID cards inorder to overcome Civitas' most critical usability problem, namely credential handling. Together with a voter-processdescription and a user-interface, we pave the way for the useof Civitas in real-world elections. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/ARES.2012.75 | Availability, Reliability and Security |
Keywords | Field | DocType |
real-world election,useof civitas,credential handling,critical usability problem,practical point,security property,voting scheme civitas,real world,strong trustassumptions,strong security property,usability weakness,strong trust assumptionsand,trusted computing,usability,user interfaces | Electronic voting,Internet privacy,Trusted Computing,Voting,Computer science,Computer security,Usability,Security properties,User interface,Credential,Coercion resistance | Conference |
ISBN | Citations | PageRank |
978-1-4673-2244-7 | 10 | 0.57 |
References | Authors | |
7 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Stephan Neumann | 1 | 59 | 11.55 |
Melanie Volkamer | 2 | 414 | 75.40 |