2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.20
|View full text |Cite
|
Sign up to set email alerts
|

A Peered Bulletin Board for Robust Use in Verifiable Voting Systems

Abstract: The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the event of malfeasance. In practice, the election authority has responsibility for implementing the web bulletin board correctly and reliably, and will wish to ensure that it behaves correctly even in the presence of failures and attacks. To ensure robustness, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(64 citation statements)
references
References 10 publications
0
64
0
Order By: Relevance
“…The Bulletin Board Assumption can be facilitated either by establishing a central server, supervised by trusted third-party observers, or implemented in a distributed way (e.g. [14]). The Cryptography Assumption is common to the voting systems based on cryptographic mechanisms, and the Authentic List of Keys Assumption is based upon the public list of all eligible voters, the integrity of which is something that should be ensured in traditional elections as well.…”
Section: Discussion On the Assumptionsmentioning
confidence: 99%
“…The Bulletin Board Assumption can be facilitated either by establishing a central server, supervised by trusted third-party observers, or implemented in a distributed way (e.g. [14]). The Cryptography Assumption is common to the voting systems based on cryptographic mechanisms, and the Authentic List of Keys Assumption is based upon the public list of all eligible voters, the integrity of which is something that should be ensured in traditional elections as well.…”
Section: Discussion On the Assumptionsmentioning
confidence: 99%
“…Dini presents a distributed e-voting system, which however is not end-to-end verifiable [Dini 2003]. In [Culnane and Schneider 2014], there is a distributed BB implementation, also handling vote collection, according to the design of the vVote end-to-end verifiable e-voting system [Culnane et al 2015], which in turn is an adaptation of the Prêtà Voter e-voting system [Chaum et al 2005]. In [Culnane and Schneider 2014], the proper operation of the BB during ballot casting requires a trusted device for signature verification.…”
Section: Voting Systemsmentioning
confidence: 99%
“…E-voting systems are a powerful technology to improve the election process. Kiosk-based evoting systems, e.g., [Chaum 2001;Chaum et al 2005;Fisher et al 2006;Chaum et al 2008;Benaloh et al 2013;Culnane and Schneider 2014], allow the tally to be produced faster, but require the voter's physical presence at the booth. Internet e-voting systems, e.g., [Cramer et al 1997;Adida 2008;Clarkson et al 2008;Kutylowski and Zagórski 2010;Gjøsteen 2013;Zagórski et al 2013;Chaum 2001;Chaum et al 2008;Zagórski et al 2013;Kiayias et al 2015], however, allow voters to cast their votes remotely.…”
Section: Introductionmentioning
confidence: 99%
“…engages the typical exam roles: the candidate (C), the examiner (E), and the exam authority (EA) (called manager in the original paper). The protocol uses two particular building blocks: an exponential mixnet (NET) [19] and an append-only bulletin board (BB) [8]. The protocol's only trust assumption is that there is at least one honest server in NET.…”
Section: Use Case #2: Remark!mentioning
confidence: 99%