Skip to main content

E-vote and PKI’s: a Need, a Bliss or a Curse?

  • Chapter
Secure Electronic Voting

Part of the book series: Advances in Information Security ((ADIS,volume 7))

Abstract

With the increasing popularity public key infrastructures have been acquiring in recent years and the legislative support for digital signatures, electronic voting protocols are moving from a strictly research area to the commercial arena. In this paper we examine the role public key infrastructures play in electronic voting in various protocols proposed in the literature, some of which are the kernel of experimental projects and/or commercial products. Although one of the rationales to move towards electronic voting systems is cost-effectiveness, in this paper we argue that performance issues should not be overlooked, especially in case of disaster recovery, were a CA to revoke all of its certificates during an election. Based on performance evaluation studies, we show that directory service access may become the system bottleneck.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adler, J., Dai, W., Green, R., Neff, A. “Computational Details of the VoteHere Homomorphic Election System”. November 2000;http://www.votehere.net/vh-content-v2.0/hom.pdf

    Google Scholar 

  2. Aronsson, H. “Zero Knowledge Protocols and Small Systems”, Technical Report, 1995; http://saturn.tcs.hut.fi/--helger/crypto/link/zeroknowledge/

    Google Scholar 

  3. Balacheff, B., Chen, L., Plaquin, D., Proudler, G. “A trusted process to digitally sign a document”, In New Security Paradigms Workshop 2001, ACM Press, 2001.

    Google Scholar 

  4. Benaloh, J., Tuinstra, D. “Receipt-Free Secret-Ballot Elections”, In Proc. of the 26 111 Annual ACM Symposium on the Theory of Computing, ACM Press, pp. 544–553, 1994.

    Google Scholar 

  5. Bruschi, D., Curti, A., Rosti, E. A quantitative study of Public Key Infrastructures, Technical Report RI-DSI 268–01, Dipt. di Scienze dell’Informazione, Univ. degli Studi di Milano, 2001.

    Google Scholar 

  6. Bruschi, D., Rosti, E. “Infecting digital signatures: The new threat”. In preparation, 2002.

    Google Scholar 

  7. Burmester, M., Chrissikopoulos, V., Magkos, E. “Receipt-freeness in Large-Scale Elections without Untappable Channels”, 2001; http://thalis.cs.unipi.gr/~emagos

    Google Scholar 

  8. Chaum, D. “Untraceable electronic mail, return address, and digital pseudonyms”, In Com. of the ACM, 24: 84–88, 1981.

    Article  Google Scholar 

  9. Chaum, D. “Blind signatures for untraceable payments”, In Advances in Cryptology, CRYPTO’ 82, Springer-Verlag, pp. 199–203, 1982.

    Google Scholar 

  10. Chaum, D. “Security without identification: transaction systems to make big brother obsolete”, In Com. of the ACM, 28:1030–1044, 1985.

    Article  Google Scholar 

  11. Chaum, D. “Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA”, In Advances in Cryptology, EUROCRYPT’ 88, pp.177–182, 1989.

    Google Scholar 

  12. Cohen, J. “Improving Privacy in Cryptographic Elections”, Technical Report YALEU/ DCS/TR-454, Yale University, February 1986.

    Google Scholar 

  13. Cohen, J., Fisher, M. “A Robust and Verifiable Cryptographically Secure Election Scheme”, Technical Report YALEU/DCS/TR-416, Yale University, 1985.

    Google Scholar 

  14. Cramer, R., Gennaro, R., Schoenmakers, B. “A Secure and Optimally Efficient Multi-Authority Election Scheme”. In Advances in Cryptology, EUROCRYPT ’ 97, LNCS 1233, Springer-Verlag, pp. 103–118, 1997.

    MathSciNet  Google Scholar 

  15. Cranor, L. “Electronic voting: computerized polls may save money, protect privacy”, In ACM Crossroads (electronic Journal), 1996.

    Google Scholar 

  16. Cranor, L. “Internet Privacy:A Public Concern”, 1998;http://www.acm.org/pubs/citations/journals/networker/1998–2–3/p13-cranor

    Google Scholar 

  17. Cranor, L., Cytron, R. “Sensus: A Security-Conscious Electronic Polling System for the Internet”. In Hawaii International Conference on System Sciences, Hawaii, 1997.

    Google Scholar 

  18. DuRette, B. W. “Multiple Administrators for Electronic Voting”. Bachelor’s Thesis, MIT, May 1999,http://theory.lcs.mit.edu/~cis/cis-theses.html

    Google Scholar 

  19. Fujioka, A., Okamoto, T., Ohta, K. “A Practical Secret Voting Scheme for Large Scale Elections”. In Advances in Cryptology, ASIACRYPT’ 92, LNCS 718, Springer-Verlag, pp. 244–251, 1993.

    Google Scholar 

  20. Herschberg, M. “Secure Electronic Voting Using the World Wide Web”. Master’s Thesis, MIT, June 1997; http://theory.lcs.mit.edu/~cis/theses/herschberg-masters.pdf

    Google Scholar 

  21. Housley, R., Ford, W., Polk, W., Solo, D. “Public Key Infrastructure Certificate and CRL Profile”, RFC2459, 1999.

    Google Scholar 

  22. Housley, R., Polk, W. “Internet X.509 Public Key Infrastructure”, RFC2528, 1999.

    Google Scholar 

  23. Itoh, K., Kurosawa, K., Park, C. “Efficient Anonymous Channel and All/Nothing Election Scheme”,In Advances in Cryptology, EUROCRYPT’ 93 LNCS 765, Springer-Verlag, pp. 248–259, 1993.

    Google Scholar 

  24. Karro, J., Wang, J. “Towards a Practical, Secure and Very Large Scale Online Election”, In Proceedings 15th Annual Computer Security Applications Conference (ACSAC ‘89), ACM Press, 1999.

    Google Scholar 

  25. Killian, J., Sako, K. “Receipt-Free Mix-Type Voting Scheme; a practical solution to the implementation of a voting booth”, In Proc. of EUROCRYPT’ 95, LNCS 921, Springer-Verlag, pp. 393–403, 1995.

    Google Scholar 

  26. Neff, A. “Conductiong a Universally Verifiable Electronic Election Using Homomorphic Encryption”, November 2000; votehere.org/whitepapers/

    Google Scholar 

  27. Neff, A. “A Verifiable Secret Shuffle and its Application to E-Voting”, August 2001; http://www.votehere.com

    Google Scholar 

  28. Nurmi, H., Salomaa, A., Santean, L. “Secret Ballot Elections in Computer Networks”, Computers & Security 36, 10:553–560, 1991.

    Article  Google Scholar 

  29. Radwin, M. “An Untraceable, Universally Verifiable Voting Scheme”, In Seminar in Cryptology, 1995.

    Google Scholar 

  30. Salomaa, A. “Verifying and recasting secret ballots in computer networks”, In New results and new trends in computer science, LNCS 555, Springer-Verlag, pp. 283–289, 1991.

    Article  Google Scholar 

  31. Schoenmakers, B. “Compensating for lack of transparency”, In Proc. of the 10th Conference on Computers, Freedom and Privacy, ACM Press, pp. 231–233, April 2000.

    Google Scholar 

  32. Schoenmakers, B. “Fully Auditable Electronic Secret-Ballot Elections”, 2000;http://www.eucybervote.org/publications.html

    Google Scholar 

  33. Shamir, A. “How to share a secret”, In Communication of the ACM, 22:612–613, 1979.

    Article  MathSciNet  MATH  Google Scholar 

  34. Wang, X., Schulzrinne, H., Kandlur, D., Verma, D. “Measurement and analysis of LDAP performance”, In ACM SIGMETRICS 2000, ACM Press, pp. 156–165, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer Science+Business Media New York

About this chapter

Cite this chapter

Bruschi, D., Poletti, G., Rosti, E. (2003). E-vote and PKI’s: a Need, a Bliss or a Curse?. In: Gritzalis, D.A. (eds) Secure Electronic Voting. Advances in Information Security, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0239-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-0239-5_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4981-5

  • Online ISBN: 978-1-4615-0239-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics