Skip to main content

Vote Casting in Any Preferred Constituency: A New Voting Channel

  • Conference paper
E-Voting and Identify (Vote-ID 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7985))

Included in the following conference series:

  • 672 Accesses

Abstract

In our society a rising number of people change their residence regularly. Insofar, mobility seems to be necessary even on Election Day, which is the reason why an increasing number of eligible voters use the opportunity of postal voting. Thereby, the abidance by the election principles, especially the freedom and secrecy of elections, is automatically transferred into the private sector. This would not be necessary if eligible voters had the possibility to cast their vote in any preferred constituency within the electoral area. Therefore, we investigate in this work if and how vote casting in any constituency can be constitutionally compliant, while maintaining the current electoral system. We also consider the integration of the new German electronic ID card for voter identification and authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Austrian Ministry for Science and Research: Evaluierungsbericht: E-Voting bei den Hochschülerinnen- und Hochschüler-schaftswahlen 2009, E-voting evaluation report, Wien (2010) (in German)

    Google Scholar 

  2. Briefwahl, http://www.bundeswahlleiter.de/de/glossar/texte/Briefwahl.html (online: accessed May 10, 2013) (in German)

  3. Bräunlich, K., Kasten, A., Grimm, R.: Der neue Personalausweis zur Authentifizierung bei elektronischen Wahlen. In: Der 12. Deutsche IT-Sicherheitskongress - Sicher in die digitale Welt von morgen, pp. 211–225 (2011) (in German)

    Google Scholar 

  4. Bräunlich, K., Grimm, R., Kasten, A., Vowé, S., Jahn, N.: Der neue Personalausweis zur Authentifizierung von Wählern bei Onlinewahlen (2011) (in German)

    Google Scholar 

  5. Budurushi, J.: End-to-End Verifiable and Coercion Resistant Electronic Voting Protocol for Distributed Voting Machines in Polling Stations. Master thesis. Darmstadt (2012)

    Google Scholar 

  6. Budurushi, J., Neumann, S., Volkamer, M.: Smart Cards in Electronic Voting: Lessons Learned from Applications in Legally binding Elections and Approaches Proposed in Scientific Papers. In: Kripp, M.J., Volkamer, M., Grimm, R. (eds.) 5th International Conference on Electronic Voting 2012, vol. 205, pp. 257–270. Gesellschaft für Informatik, Bregenz (2012)

    Google Scholar 

  7. Bundesgesetzblatt I, No. 21, pp. 383–388 (May 9, 1956), http://www.bgbl.de/Xaver/start.xav?startbk=Bundesanzeiger_BGBl&bk=Bundesanzeiger_BGBl&start=//%5Battr_id=%27bgbl156s0383.pdf%27%5D (online: accessed May 10, 2013) (in German)

  8. Bundesgesetzblatt I, No. 26, pp. 1342–1350 (April 26, 2002), http://www.bgbl.de/Xaver/start.xav?startbk=Bundesanzeiger_BGBl&bk=Bundesanzeiger_BGBl&start=//%5Battr_id=%27bgbl102s1342.pdf%27%5D (online: accessed May 10, 2013) (in German)

  9. Carracedo Gallardo, J., Belleboni, P.E.: Use of the New Smart Identity Card to Reinforce Electronic Voting Guarantees. In: 4th International Conference for Internet Technology and Secured Transactions, pp. 1–6. IEEE Press, London (2009)

    Google Scholar 

  10. Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, T.A., Vora, L.P.: Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. IEEE Security & Privacy, 40–46 (2008)

    Google Scholar 

  11. Deutscher Bundestag, Drucksache 17/10158, http://dipbt.bundestag.de/dip21/btd/17/101/1710158.pdf (online: accessed May 10, 2013) (in German)

  12. Estonian National Electoral Committee: E-voting System General Overview, http://www.vvk.ee/public/dok/General_Description_E-Voting_2010.pdf (online: accessed May 10, 2013)

  13. Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 59, pp. 119–128 (1981)

    Google Scholar 

  14. Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 123, pp. 39–88 (2009)

    Google Scholar 

  15. Federal Constitutional Court of Germany: Entscheidungen des Bundesverfassungsgerichts (BVerfGE) 95, pp. 335–407 (1996)

    Google Scholar 

  16. Federal Office for Information Security: Advanced Security Mechanism for Machine Readable Travel Documents - Part 2. Technical report, BSI-TR-03110-2 (2012)

    Google Scholar 

  17. Federal Office for Information Security: Functional Specification eID-Server - Part 1. Technical report, BSI-TR-03130-1 (2012)

    Google Scholar 

  18. Gibson, J.P., Lallet, E., Raffy, J.-L.: Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements. In: Giese, H. (ed.) ISARCS 2010. LNCS, vol. 6150, pp. 89–108. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, http://tools.ietf.org/html/rfc5280 (online: accessed May 10, 2013)

  20. Meister, G., Hühnlein, D., Araujo, R.: eVoting with the European Citizen Card. In: Brömme, A., Busch, C., Hühnlein, D. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, vol. 137, pp. 67–78. Gesellschaft für Informatik, Darmstadt (2008)

    Google Scholar 

  21. Mishra, A., Gupta, B.B., Joshi, R.C.: A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques. In: European Intelligence and Security Informatics Conference (EISIC), pp. 286–289 (2011)

    Google Scholar 

  22. Personalausweisgesetz (PAuswG), http://www.gesetze-im-internet.de/pauswg/BJNR134610009.html (online: accessed May 10, 2013) (in German)

  23. Popoveniuc, S., Hosp, B.: An Introduction to PunchScan. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 242–259. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  24. Referentenentwurf Bundesmeldegesetz (MG), http://philipbanse.de/docs/Referenenentwurf_Meldegesetz.pdf (online: accessed May 10, 2013) (in German)

  25. Richter, P.: Briefwahl für alle? - Die Freigabe der Fernwahl und der Grundsatz der Öffentlichkeit der Wahl. In: Die O ̈ffentliche Verwaltung, pp. 606–610. W. Kohlhammer GmbH (2010) (in German)

    Google Scholar 

  26. Rössler, T.: Electronic Voting Using Identity Domain Separation and Hardware Security Modules. In: Godart, C., Gronau, N., Sharma, S., Canals, G. (eds.) I3E 2009. IFIP AICT, vol. 305, pp. 1–12. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  27. Ryan, Y.A.P., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 662–673 (2009)

    Google Scholar 

  28. Sandler, D.R., Wallach, D.S.: The case for networked remote voting precincts. In: Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Technology Workshop, San Jose, CA (2008)

    Google Scholar 

  29. Schreiber, W.: Bundeswahlgesetz: Kommentar. Carl Heymanns Verlag, Köln (2009) (in German)

    Google Scholar 

  30. Subramani, S.: Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. SANS Institute InfoSec Reading Room, http://www.sans.org/reading_room/whitepapers/detection/denial-service-attacks-mitigation-techniques-real-time-implementation-detailed-analysi_33764 (online: accessed May 10, 2013)

  31. The Transport Layer Security (TLS) Protocol Version 1.2 , http://tools.ietf.org/html/rfc5246 (online: accessed May 10, 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Budurushi, J., Henning, M., Volkamer, M. (2013). Vote Casting in Any Preferred Constituency: A New Voting Channel. In: Heather, J., Schneider, S., Teague, V. (eds) E-Voting and Identify. Vote-ID 2013. Lecture Notes in Computer Science, vol 7985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39185-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39185-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39184-2

  • Online ISBN: 978-3-642-39185-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics