Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey
Remote electronic voting, often called online or Internet voting, has been subject to research for the last four decades. It is regularly discussed in public debates, especially in the context of enabling voters to conveniently cast their ballot from home using their personal devices. Since these devices are not under the control of the electoral authority and could be potentially compromised, this setting is referred to as an “uncontrolled environment” for which special security assumptions have to be considered. This paper employs general election principles to derive cryptographic, technical, and organizational requirements for remote electronic voting. Based on these requirements, we have extended an existing methodology to assess online voting schemes and develop a corresponding reference attacker model to support the preparation of tailored protection profiles for different levels of elections. After presenting a broad survey of different voting schemes, we use this methodology to assess and classify those schemes comparatively by leveraging four election-specific attacker models.
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey
ACM Computing Surveys, Volume 55, Issue 8
Authors: | Michael Heinl, Simon Goelz,, Simon Goelz, and Christoph Boesch |
Year/month: | 2022/12 |
Booktitle: | ACM Computing Surveys, Volume 55, Issue 8 |
Pages: | 1 - 44 |
Fulltext: | click here |
Abstract |
|
Remote electronic voting, often called online or Internet voting, has been subject to research for the last four decades. It is regularly discussed in public debates, especially in the context of enabling voters to conveniently cast their ballot from home using their personal devices. Since these devices are not under the control of the electoral authority and could be potentially compromised, this setting is referred to as an “uncontrolled environment” for which special security assumptions have to be considered. This paper employs general election principles to derive cryptographic, technical, and organizational requirements for remote electronic voting. Based on these requirements, we have extended an existing methodology to assess online voting schemes and develop a corresponding reference attacker model to support the preparation of tailored protection profiles for different levels of elections. After presenting a broad survey of different voting schemes, we use this methodology to assess and classify those schemes comparatively by leveraging four election-specific attacker models. |
Bibtex:
@inproceedings {author = { Michael Heinl and Simon Goelz, and Simon Goelz and Christoph Boesch},
title = { Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey },
year = { 2022 },
month = { December },
booktitle = { ACM Computing Surveys, Volume 55, Issue 8 },
pages = { 1 - 44 },
url = { https://doi.org/10.1145/3551386 },
}