DocumentCode :
2554762
Title :
Clash Attacks on the Verifiability of E-Voting Systems
Author :
Kusters, Ralf ; Truderung, Tomasz ; Vogt, Andreas
Author_Institution :
Univ. of Trier, Trier, Germany
fYear :
2012
fDate :
20-23 May 2012
Firstpage :
395
Lastpage :
409
Abstract :
Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means that voters can check that their votes were actually counted and that the published result of the election is correct, even if the voting machines/authorities are (partially) untrusted. In this paper, we raise awareness of a simple attack, which we call a clash attack, on the verifiability of e-voting systems. The main idea behind this attack is that voting machines manage to provide different voters with the same receipt. As a result, the voting authorities can safely replace ballots by new ballots, and by this, manipulate the election without being detected. This attack does not seem to have attracted much attention in the literature. Even though the attack is quite simple, we show that, under reasonable trust assumptions, it applies to several e-voting systems that have been designed to provide verifiability. In particular, we show that it applies to the prominent Three Ballot and VAV voting systems as well as to two e-voting systems that have been deployed in real elections: the Wombat Voting system and a variant of the Helios voting system. We discuss countermeasures for each of these systems and for (various variants of) Helios provide a formal analysis based on a rigorous definition of verifiability. More precisely, our analysis of Helios is with respect to the more general and in the area of e-voting often overlooked notion of accountability.
Keywords :
public administration; security of data; Helios voting system; VAV voting systems; Wombat voting system; clash attacks; e-voting systems verifiability; real elections; voting authorities; voting machines; Browsers; Educational institutions; Electronic voting; Encryption; Nominations and elections; accountability; protocol analysis; verifiability; voting;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2012 IEEE Symposium on
Conference_Location :
San Francisco, CA
ISSN :
1081-6011
Print_ISBN :
978-1-4673-1244-8
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2012.32
Filename :
6234426
Link To Document :
بازگشت