E-Voting Verification

Authors

  • Zulkarnaim Masyhur Sekolah Teknik Elektro dan Informatika
  • Budi Rahardjo Sekolah Teknik Elektro dan Informatika

Keywords:

e-voting, verification, individual verifiability, universal verifiability, elegibilty verifiability

Abstract

Sistem pemungutan suara elektronik (e-voting) telah berkembang pesat dan menggantikan sistem pemungutan suara konvensional yang menggunakan kertas. Ada beberapa aspek yang mempengaruhi kepercayaan terhadap sistem pemungutan suara elektronik. Salah satu aspek vital yang harus diperhatikan dalam membuat sistem pemungutan suara elektronik adalah aspek verifikasi. Aspek verifikasi dikatakan vital sebab rendahya tingkat kepercaryaan pemilih dan kandidat yang rendah terhadap sistem pemungutan suara elektronik. Ada beberapa jenis verifikasi dalam sistem pemungutan suara elektronik yaitu individual verifiability, universal verifiability, dan elegibility verifiability. Penerapan jenis-jenis verifikasi tersebut pada sistem pemungutan suara JCJ/Civitas dan Helios yang telah dikembangkan akan direview dalam paper ini.

Downloads

Download data is not yet available.

References

Calandrino, J.A., Feldman, A.J., Alex Halderman, J., Wagner, D., Yu, H., Zeller, W.P.: Source code review of the Diebold voting system. In: Report commissioned as part of the California Secretary of State’s Top-To-Bottom Review of California Voting Systems. 2007

Ardhana, M.I.G. Peningkatan Anonimitas Dan Verifiabilitas Sistem Pemungutan Suara Melalui Kriptografi Visual, Dissertation Program Doctoral Programs, School of Electrical Engineering and Informatics, Bandung Institute of Technology. 2014

Langer L., Jonker H., Pieters W. Anonymity and Verifiability in Voting: Understanding (Un)Linkability, 12th International Conference, ICICS 2010, Volume 6476 of the series Lecture Notes In Computer Science pp 296-310, Springer

Kremer, S., Ryan, M., Smyth, B. Election Verifiability in Electronic Voting Protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389– 404. Springer, Heidelberg

Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy 2(1). 2004.

Benaloh, J.: Simple verifiable elections. In: Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop, p. 5. USENIX Association, Berkeley

Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Boneh, D. (ed.) USENIX Security Symposium. 2002. pp. 339– 353. USENIX

Kremer, S., Ryan, M., Smyth, B.: Election Verifiability in Electronic Voting Protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389– 404. Springer, Heidelberg

Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg

Adida, B.: Helios: Web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium. 2008. pp. 335–348. USENIX Association

Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., De Capitani di Vimercati, S., Dingledine, R. (eds.) WPES. 2005. pp. 61–70.

Bursuc S., Grewal G.S., Ryan M.D., Trivitas: Voters Directly Verifying Votes,Third International Conference, VoteID 2011, Volume 7187 of the series Lecture Notes in Computer Science pp 190-207, Springer

Ben Adida, Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Electing University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. In EVT/WOTE’09: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX Association, 2009

Smyth, Ben; Frink, Steven; Clarkson, Michael R. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ. Computing and Information Science Technical Reports. Cornell University. 201

David Bernhard, Oliver Pereira, and Bodgan Warinschi. How not to prove yourself: pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. In ASIACRYPT’12: 18Th international conference on the theory and Application of Cryptology and Information Security. 2012 volume 7658 of LNCS, pages 626-643. Springer.

David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, and Bogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions. Cryptology ePrint Archive, 2015. Report 2015/255 (version 20150319:100626

Published

25-01-2018

How to Cite

[1]
Z. Masyhur and B. Rahardjo, “E-Voting Verification”, SENTER, pp. 185–193, Jan. 2018.