2019
DOI: 10.1007/978-3-030-29381-9_32
|View full text |Cite
|
Sign up to set email alerts
|

Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations

Abstract: Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting. Voters might be concerned about their vote being recorded correctly and included in the final tally. To mitigate mistrust, many Internet-enabled voting systems build verifiability into their systems. This allows voters to verify that their votes have been cast as intended, stored as cast and tallied as stored at the conclusion of the voting period. Veri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 22 publications
0
4
1
Order By: Relevance
“…Some users were unable to detect the manipulation to the verification code in the original system. This observation is different from the results of the study in [15], where all the participants were able to detect the manipulation using a code-based verification similar to the Swiss system. One possible explanation might be that the participants in the previous study were explicitly instructed to verify their vote, whereas in our study the focus was on casting a vote.…”
Section: Discussioncontrasting
confidence: 99%
See 3 more Smart Citations
“…Some users were unable to detect the manipulation to the verification code in the original system. This observation is different from the results of the study in [15], where all the participants were able to detect the manipulation using a code-based verification similar to the Swiss system. One possible explanation might be that the participants in the previous study were explicitly instructed to verify their vote, whereas in our study the focus was on casting a vote.…”
Section: Discussioncontrasting
confidence: 99%
“…Although both the original and improved systems received high SUS scores, the complexity of the procedure and the codes was an issue, again confirming the findings from [15]. Voters might well be willing to accept complex systems if they are told that the complexity is necessary for security (see [16]).…”
Section: Discussionmentioning
confidence: 52%
See 2 more Smart Citations
“…Hence, IV can only be provided if we assume a trusted platform on the voter's side, but this is impractical. A more practical solution that gives some relief to the problem is to have the voter Challenge-or-Cast the ballot with a second independent device [34]. Also note that the querying of the DPBB for a specific ballot should only happen over a non-anonymous channel (same as casting the ballot).…”
Section: Verifiabilitymentioning
confidence: 99%