Abstract
With the increasing popularity public key infrastructures have been acquiring in recent years and the legislative support for digital signatures, electronic voting protocols are moving from a strictly research area to the commercial arena. In this paper we examine the role public key infrastructures play in electronic voting in various protocols proposed in the literature, some of which are the kernel of experimental projects and/or commercial products. Although one of the rationales to move towards electronic voting systems is cost-effectiveness, in this paper we argue that performance issues should not be overlooked, especially in case of disaster recovery, were a CA to revoke all of its certificates during an election. Based on performance evaluation studies, we show that directory service access may become the system bottleneck.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adler, J., Dai, W., Green, R., Neff, A. “Computational Details of the VoteHere Homomorphic Election System”. November 2000;http://www.votehere.net/vh-content-v2.0/hom.pdf
Aronsson, H. “Zero Knowledge Protocols and Small Systems”, Technical Report, 1995; http://saturn.tcs.hut.fi/--helger/crypto/link/zeroknowledge/
Balacheff, B., Chen, L., Plaquin, D., Proudler, G. “A trusted process to digitally sign a document”, In New Security Paradigms Workshop 2001, ACM Press, 2001.
Benaloh, J., Tuinstra, D. “Receipt-Free Secret-Ballot Elections”, In Proc. of the 26 111 Annual ACM Symposium on the Theory of Computing, ACM Press, pp. 544–553, 1994.
Bruschi, D., Curti, A., Rosti, E. A quantitative study of Public Key Infrastructures, Technical Report RI-DSI 268–01, Dipt. di Scienze dell’Informazione, Univ. degli Studi di Milano, 2001.
Bruschi, D., Rosti, E. “Infecting digital signatures: The new threat”. In preparation, 2002.
Burmester, M., Chrissikopoulos, V., Magkos, E. “Receipt-freeness in Large-Scale Elections without Untappable Channels”, 2001; http://thalis.cs.unipi.gr/~emagos
Chaum, D. “Untraceable electronic mail, return address, and digital pseudonyms”, In Com. of the ACM, 24: 84–88, 1981.
Chaum, D. “Blind signatures for untraceable payments”, In Advances in Cryptology, CRYPTO’ 82, Springer-Verlag, pp. 199–203, 1982.
Chaum, D. “Security without identification: transaction systems to make big brother obsolete”, In Com. of the ACM, 28:1030–1044, 1985.
Chaum, D. “Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA”, In Advances in Cryptology, EUROCRYPT’ 88, pp.177–182, 1989.
Cohen, J. “Improving Privacy in Cryptographic Elections”, Technical Report YALEU/ DCS/TR-454, Yale University, February 1986.
Cohen, J., Fisher, M. “A Robust and Verifiable Cryptographically Secure Election Scheme”, Technical Report YALEU/DCS/TR-416, Yale University, 1985.
Cramer, R., Gennaro, R., Schoenmakers, B. “A Secure and Optimally Efficient Multi-Authority Election Scheme”. In Advances in Cryptology, EUROCRYPT ’ 97, LNCS 1233, Springer-Verlag, pp. 103–118, 1997.
Cranor, L. “Electronic voting: computerized polls may save money, protect privacy”, In ACM Crossroads (electronic Journal), 1996.
Cranor, L. “Internet Privacy:A Public Concern”, 1998;http://www.acm.org/pubs/citations/journals/networker/1998–2–3/p13-cranor
Cranor, L., Cytron, R. “Sensus: A Security-Conscious Electronic Polling System for the Internet”. In Hawaii International Conference on System Sciences, Hawaii, 1997.
DuRette, B. W. “Multiple Administrators for Electronic Voting”. Bachelor’s Thesis, MIT, May 1999,http://theory.lcs.mit.edu/~cis/cis-theses.html
Fujioka, A., Okamoto, T., Ohta, K. “A Practical Secret Voting Scheme for Large Scale Elections”. In Advances in Cryptology, ASIACRYPT’ 92, LNCS 718, Springer-Verlag, pp. 244–251, 1993.
Herschberg, M. “Secure Electronic Voting Using the World Wide Web”. Master’s Thesis, MIT, June 1997; http://theory.lcs.mit.edu/~cis/theses/herschberg-masters.pdf
Housley, R., Ford, W., Polk, W., Solo, D. “Public Key Infrastructure Certificate and CRL Profile”, RFC2459, 1999.
Housley, R., Polk, W. “Internet X.509 Public Key Infrastructure”, RFC2528, 1999.
Itoh, K., Kurosawa, K., Park, C. “Efficient Anonymous Channel and All/Nothing Election Scheme”,In Advances in Cryptology, EUROCRYPT’ 93 LNCS 765, Springer-Verlag, pp. 248–259, 1993.
Karro, J., Wang, J. “Towards a Practical, Secure and Very Large Scale Online Election”, In Proceedings 15th Annual Computer Security Applications Conference (ACSAC ‘89), ACM Press, 1999.
Killian, J., Sako, K. “Receipt-Free Mix-Type Voting Scheme; a practical solution to the implementation of a voting booth”, In Proc. of EUROCRYPT’ 95, LNCS 921, Springer-Verlag, pp. 393–403, 1995.
Neff, A. “Conductiong a Universally Verifiable Electronic Election Using Homomorphic Encryption”, November 2000; votehere.org/whitepapers/
Neff, A. “A Verifiable Secret Shuffle and its Application to E-Voting”, August 2001; http://www.votehere.com
Nurmi, H., Salomaa, A., Santean, L. “Secret Ballot Elections in Computer Networks”, Computers & Security 36, 10:553–560, 1991.
Radwin, M. “An Untraceable, Universally Verifiable Voting Scheme”, In Seminar in Cryptology, 1995.
Salomaa, A. “Verifying and recasting secret ballots in computer networks”, In New results and new trends in computer science, LNCS 555, Springer-Verlag, pp. 283–289, 1991.
Schoenmakers, B. “Compensating for lack of transparency”, In Proc. of the 10th Conference on Computers, Freedom and Privacy, ACM Press, pp. 231–233, April 2000.
Schoenmakers, B. “Fully Auditable Electronic Secret-Ballot Elections”, 2000;http://www.eucybervote.org/publications.html
Shamir, A. “How to share a secret”, In Communication of the ACM, 22:612–613, 1979.
Wang, X., Schulzrinne, H., Kandlur, D., Verma, D. “Measurement and analysis of LDAP performance”, In ACM SIGMETRICS 2000, ACM Press, pp. 156–165, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this chapter
Cite this chapter
Bruschi, D., Poletti, G., Rosti, E. (2003). E-vote and PKI’s: a Need, a Bliss or a Curse?. In: Gritzalis, D.A. (eds) Secure Electronic Voting. Advances in Information Security, vol 7. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0239-5_13
Download citation
DOI: https://doi.org/10.1007/978-1-4615-0239-5_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-4981-5
Online ISBN: 978-1-4615-0239-5
eBook Packages: Springer Book Archive