Escolar Documentos
Profissional Documentos
Cultura Documentos
By Jim Adler
President & CEO
VoteHere.net
Voting is a complex process, which involves an interaction of data security, privacy and trust.
Any successful voting system requires complete voter privacy, strict audit trails, and an easily
used and administered process.
Online voting systems are difficult to design because verification and privacy requirements present conflicting goals.
The most private systems allow anonymous votes to be cast over the Internet, potentially opening the virtual ballot box to
stuffing from third parties or corrupt authorities. The most verifiable systems maintain an audit trail between the ballot and
the voter, essentially eliminating any privacy of how a voter actually voted.
This paper outlines the requirements of an effective, public-sector online voting system and briefly discusses voting systems
commonly found on the Internet. A discussion of the VoteHere™ Platinum Election System will follow in the context of
these systems.
Summary
Online voting systems have been under consideration in the cryptographic literature since the early 1980’s. From the literature,
two main secure methods have emerged, individually verifiable methods and universally verifiable elections. Although both
meet privacy requirements, individually verifiable election systems require voters to verify their votes, which is often unlikely.
Universally verifiable elections allow any observer to verify the integrity of the election without violating voter privacy.
References
[Ben86] J. Benaloh. Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret. Advances in Cryptology –
CRYPTO ’86, Lecture Notes in Computer Science, pp. 251-260, Springer-Verlag, Berlin, 1987.
[BY86] J. Benaloh, M. Yung. Distributing the power of a government to enhance the privacy of voters. ACM Symposium
on Principles of Distributed Computing, pp. 52-62, 1986.
[Ben87] J. Benaloh. Verifiable Secret-Ballot Elections. Yale University Department of Computer Science Technical
Report, number 561, 1987.
[BT94] J. Benaloh, D. Tuinstra. Receipt-free secret-ballot elections. Proceedings of the Twenty-sixth Annual ACM
Symposium on the Theory of Computing, pp. 544-553, 1994.
[Cha81] D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM,
24(2):84-88, http://www.eskimo.com/~weidai/mix-net.txt, 1981.
[Cra96] L. Cranor. Electronic Voting. ACM Crossroads, Issue 2.4, http://www.acm.org/crossroads/xrds2-4/voting.html,
1996.
[FOO92] A. Fujioka, T. Okamoto, K. Ohta. A practical secret voting scheme for large scale elections. Advances in
Cryptology – AUSCRYPT ’92, Lecture Notes in Computer Science, pp. 244-251, Springer-Verlag, 1992.
[PIK93] C. Park, K. Itoh, K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. Advances in
Cryptology – EUROCRYPT ‘93, Lecture Notes in Computer Science, pp. 248-259, Springer-Verlag, 1993.
[Sch95] B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley &
Sons, 1995.
[SGR] P. Syverson, D. Goldschlag, M. Reed. Onion Routing, http://www.onion-router.net/Publications.html, 1996-1999.