2009
DOI: 10.1007/978-3-642-04135-8_7
|View full text |Cite
|
Sign up to set email alerts
|

VeryVote: A Voter Verifiable Code Voting System

Abstract: Abstract. Code voting is a technique used to address the secure platform problem of remote voting. A code voting system consists in secretly sending, e.g. by mail, code sheets to voters that map their choices to entry codes in their ballot. While voting, the voter uses the code sheet to know what code to enter in order to vote for a particular candidate. In effect, the voter does the vote encryption and, since no malicious software on the PC has access to the code sheet it is not able to change the voter's int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…The remaining three Internet E2E voting systems we are aware of (Ryan and Teague, 2009;Joaquim et al, 2009;Heiberg et al, 2010) use a code voting (Chaum, 2001;Oppliger, 2002) style voter interaction, combined with some cryptographic techniques to provide privacy and voter recorded-as-intended verification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The remaining three Internet E2E voting systems we are aware of (Ryan and Teague, 2009;Joaquim et al, 2009;Heiberg et al, 2010) use a code voting (Chaum, 2001;Oppliger, 2002) style voter interaction, combined with some cryptographic techniques to provide privacy and voter recorded-as-intended verification.…”
Section: Related Workmentioning
confidence: 99%
“…The VeryVote system (Joaquim et al, 2009) combines the code voting approach with the highly sound Neff (2004) castas-intended verification mechanism (MarkPledge). The castas-intended verification mechanism used in VeryVote offers a soundness of 1 À k!/2 a , where a is a configurable security …”
Section: Related Workmentioning
confidence: 99%
“…Adida and Neff [3] and Joaquim et al [19] present simplifications to the voter interaction of MP, improving its usability. In 2006, and also based on the MP construction, Moran and Naor presented a voter verifiable voting system with everlasting privacy [21], replacing the vote encryption with vote commitments.…”
Section: Related Workmentioning
confidence: 99%
“…Note however, that each MP version (MP1, MP2 and MP3) may be used in different voting protocols, e.g. the original one [22], the simplified versions [3,22], and the Internet protocol of [19]. The described MP vote protocol has four phases [3]: the first three match the usually ZKP (commit, challenge, validation), and the last one is an anonimization and counting step.…”
Section: Markpledge Simplified Vote Protocol Overviewmentioning
confidence: 99%
See 1 more Smart Citation