Home Security in e-voting
Article
Licensed
Unlicensed Requires Authentication

Security in e-voting

  • Ralf Küsters

    Ralf Küsters received his Ph.D. in computer science from the RWTH Aachen in 2000 and his habilitation in computer science from the University of Kiel in 2005. He spent one year at Rutgers University during his Ph.D. studies and one year as a postdoctoral researcher at Stanford University. Before joining the Department of Computer Science at the University of Trier as a full professor for Information Security and Cryptography in 2007, Küsters was a lecturer and the head of the research group Foundations of Computer and Network Security in the Department of Computer Science at ETH Zurich. He was awarded the Springorum Medal of the RWTH Aachen for his distinguished diploma degree and the Borchers Medal of the RWTH Aachen for his distinguished doctoral degree. Among others, he received scholarships from the German National Academic Foundation and the German Research Foundation. Küsters has authored and co-authored over 70 peer-reviewed scientific papers and has served on program committees of various leading international conferences in the field of security and cryptography.

    Universität Trier, FB IV – Informatik, D-54286 Trier

    EMAIL logo
    and Tomasz Truderung

    Tomasz Truderung received his Ph.D. in computer science from University of Wrocław in 2000. Since then, he worked as an assistant professor at University of Wrocław and as a postdoctoral researcher at INRIA-LORIA-Lorraine Nancy, Christian-Albrechts-Universität zu Kiel, and University of Trier. Tomasz Truderung has authored and co-authored over 20 peer-reviewed scientific papers and has served on program committees of several international conferences and workshops.

    Universität Trier, FB IV – Informatik, D-54286 Trier

Published/Copyright: November 30, 2014

Abstract

Systems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior resulting in the loss of votes and incorrect election outcomes easily go undetected. In fact, numerous problems with e-voting systems have been reported in various countries. Therefore, in recent years modern e-voting systems have been designed that, among others, allow voters to check that their votes were counted correctly, even if voting machines and servers have programming errors or are outright malicious.

In this paper, after a brief discussion of the problems of today's e-voting systems, we explain fundamental security properties modern e-voting systems should provide, including the above mentioned so-called verifiability property, and present a simple e-voting system to illustrate some of these properties. One important goal of our work is to provide security guarantees of such systems not only for abstract mathematical/cryptographic models of the systems but for the implementation of the systems directly. This requires us to combine various techniques and tools from security/cryptography, program analysis, and verification.

About the authors

Ralf Küsters

Ralf Küsters received his Ph.D. in computer science from the RWTH Aachen in 2000 and his habilitation in computer science from the University of Kiel in 2005. He spent one year at Rutgers University during his Ph.D. studies and one year as a postdoctoral researcher at Stanford University. Before joining the Department of Computer Science at the University of Trier as a full professor for Information Security and Cryptography in 2007, Küsters was a lecturer and the head of the research group Foundations of Computer and Network Security in the Department of Computer Science at ETH Zurich. He was awarded the Springorum Medal of the RWTH Aachen for his distinguished diploma degree and the Borchers Medal of the RWTH Aachen for his distinguished doctoral degree. Among others, he received scholarships from the German National Academic Foundation and the German Research Foundation. Küsters has authored and co-authored over 70 peer-reviewed scientific papers and has served on program committees of various leading international conferences in the field of security and cryptography.

Universität Trier, FB IV – Informatik, D-54286 Trier

Tomasz Truderung

Tomasz Truderung received his Ph.D. in computer science from University of Wrocław in 2000. Since then, he worked as an assistant professor at University of Wrocław and as a postdoctoral researcher at INRIA-LORIA-Lorraine Nancy, Christian-Albrechts-Universität zu Kiel, and University of Trier. Tomasz Truderung has authored and co-authored over 20 peer-reviewed scientific papers and has served on program committees of several international conferences and workshops.

Universität Trier, FB IV – Informatik, D-54286 Trier

Received: 2014-6-6
Revised: 2014-9-29
Accepted: 2014-10-17
Published Online: 2014-11-30
Published in Print: 2014-12-28

©2014 Walter de Gruyter Berlin/Boston

Downloaded on 19.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/itit-2014-1062/html
Scroll to top button