Nothing Special   »   [go: up one dir, main page]

Skip to main content

Open Voting Client Architecture and Op-Ed Voting for Secret Ballot Elections

  • Conference paper
  • First Online:
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23) (ACR 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 700))

Included in the following conference series:

  • 533 Accesses

Abstract

To essentially allow voters to cast ballots using their personal devices (clients), we design a novel voting system architecture in this paper that we refer to as Open Voting Client Architecture. Then, we present details about one particular implementation of our architecture called Op-Ed Voting. Lastly, we assess the Open Voting Client Architecture system’s security. This work indicates that Op-Ed Voting can potentially increase usability and accessibility for voters while simultaneously meeting security criteria for electronic voting. Op-Ed Voting uses voters’ personal devices in an end-to-end verified protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Summative usability assessments of star-vote: a cryptographically secure e2e voting system that has been empirically proven to be easy to use. Hum. Factors 64(5), 866–889 (2022)

    Article  Google Scholar 

  2. Adida, B.: Helios documentation (2021). https://vote.heliosvoting.org/docs

  3. Adida, B.: Helios github (2021). https://github.com/benadida/helios-server

  4. Benaloh, J.: Electionguard specification v0.95 (2021). https://github.com/microsoft/electionguard/releases/tag/v0.95.0

  5. Castelló, S.G.: Individual verifiability in electronic voting. Ph.D. thesis, Universitat Politècnica de Catalunya (UPC) (2016)

    Google Scholar 

  6. Chaabane, F., Ktari, J., Frikha, T., Hamam, H.: Low power blockchained e-vote platform for university environment. Future Internet 14(9), 269 (2022)

    Article  Google Scholar 

  7. Chaurasia, P.: Offline signature verification using high pressure regions (2009). uS Patent 7,599,528

    Google Scholar 

  8. Chaurasia, P., Yogarajah, P., Condell, J., Prasad, G., McIlhatton, D., Monaghan, R.: Biometrics and counter-terrorism: the case of gait recognition. Behav. Sci. Terrorism Polit. Aggression 7(3), 210–226 (2015)

    Article  Google Scholar 

  9. Chowdary, J., Yogarajah, P., Chaurasia, P., Guruviah, V.: A multi-task learning framework for automated segmentation and classification of breast tumors from ultrasound images. Ultrason. Imaging 44(1), 3–12 (2022)

    Article  Google Scholar 

  10. Compliance, S.: Es &s evs 6.0.0.0 certification test report (2018). https://www.eac.gov/sites/default/files/voting_system/files/ESS_EVS6000_EAC_Certification_Test_Report_v4.0.pdf

  11. Compliance, S.: County of los angeles vsap tally 2.1 functional test report (2020). https://votingsystems.cdn.sos.ca.gov/vendors/LAC/vsap2-1/vsap21-funct-reprt.pdf

  12. Denis González, C., Frias Mena, D., Massó Muñoz, A., Rojas, O., Sosa-Gómez, G.: Electronic voting system using an enterprise blockchain. Appl. Sci. 12(2), 531 (2022)

    Article  Google Scholar 

  13. Galindo, D., Guasch, S., Puiggalí, J.: 2015 Neuchâtel’s cast-as-intended verification mechanism. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 3–18. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22270-7_1

    Chapter  Google Scholar 

  14. Khodadadzadeh, M., Ding, X., Chaurasia, P., Coyle, D.: A hybrid capsule network for hyperspectral image classification. IEEE J. Sel. Top. Appl. Earth Observations Remote Sens. 14, 11824–11839 (2021)

    Article  Google Scholar 

  15. Mahajan, H.B., et al.: Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Appl. Nanosci. 13, 1–14 (2022)

    Google Scholar 

  16. Mairiza, D., Zowghi, D., Nurmuliani, N.: Managing conflicts among non-functional requirements. In: 12th Australian Workshop on Requirements Engineering (2009)

    Google Scholar 

  17. Pardue, H., Yasinsac, A., Landry, J.: Towards internet voting security: a threat tree for risk assessment. In: 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1–7 (2010). https://doi.org/10.1109/CRISIS.2010.5764925

  18. Reddy, A.V., Raghavan, S.V.: Architecture of multi channel multi database voting system. In: Funabashi, M., Grzech, A. (eds.) I3E 2005. IIFIP, vol. 189, pp. 281–295. Springer, Boston, MA (2005). https://doi.org/10.1007/0-387-29773-1_19

    Chapter  Google Scholar 

  19. Roy, S., Morais, F.J.A., Salimitari, M., Chatterjee, M.: Cache attacks on blockchain based information centric networks: an experimental evaluation. In: Proceedings of the 20th International Conference on Distributed Computing and Networking, pp. 134–142 (2019)

    Google Scholar 

  20. Schmidt, A., Albert, L.A.: Designing pandemic-resilient voting systems. Socioecon. Plann. Sci. 80, 101174 (2022)

    Article  Google Scholar 

  21. School, T.W.: The business of voting (2017). https://trustthevote.org/wp-content/uploads/2017/03/2017-whartonoset_industryreport.pdf

  22. Specter, M.A., Koppel, J., Weitzner, D.: The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in us federal elections. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp. 1535–1553 (2020)

    Google Scholar 

  23. Stefanelli, R., Monnat, D.M.X.: A secure e-voting infrastructure. implementation by swiss post. Second In, 326 (2017)

    Google Scholar 

  24. van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings Fifth IEEE International Symposium on Requirements Engineering, pp. 249–262 (2001). https://doi.org/10.1109/ISRE.2001.948567

  25. van Lamsweerde, A., Darimont, R., Letier, E.: Managing conflicts in goal-driven requirements engineering. IEEE Trans. Softw. Eng. 24(11), 908–926 (1998). https://doi.org/10.1109/32.730542

    Article  Google Scholar 

  26. V &V, P.: Dominion voting systems democracy suite version 5.5 test report (2018). https://www.eac.gov/sites/default/files/voting_system/files/Dominion_Voting_Systems_D-Suite_5.5_Test_Report_Rev_A.pdf

  27. Wilson, A.: Modeling conflicts in secret ballot elections. E-Vote-ID 2019, 171 (2019)

    Google Scholar 

  28. Wilson, A.: Open Voting Client Architecture and Op-Ed Voting: a Novel Framework for Solving Requirement Conflicts in Secret Ballot Elections. Ph.D. thesis (2021), https://www.proquest.com/dissertations-theses/open-voting-client-architecture-op-ed-novel/docview/2665128159/se-2, copyright - Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works; Last updated - 2022-05-24

Download references

Acknowledgement

The research has been supported by Fidelity National Financial Distinguished Professorship in CIS grant of S. Roy, 0583-5504-51.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swapnoneel Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wilson, A., Roy, S., Mukhopadhyay, D. (2023). Open Voting Client Architecture and Op-Ed Voting for Secret Ballot Elections. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23). ACR 2023. Lecture Notes in Networks and Systems, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-031-33743-7_31

Download citation

Publish with us

Policies and ethics