Protection profile for secure e-voting systems

Kwangwoo Lee, Yunho Lee, Dongho Won, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings
Pages386-397
Number of pages12
DOIs
Publication statusPublished - 2010
Event6th International Conference on Information Security Practice and Experience, ISPEC 2010 - Seoul, Korea, Republic of
Duration: 2010 May 122010 May 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6047 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Conference on Information Security Practice and Experience, ISPEC 2010
CountryKorea, Republic of
CitySeoul
Period10/5/1210/5/13

Keywords

  • Common criteria
  • Evaluation
  • Protection profile
  • Verifiability
  • Voter verifiable audit trail
  • e-voting system

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Protection profile for secure e-voting systems'. Together they form a unique fingerprint.

  • Cite this

    Lee, K., Lee, Y., Won, D., & Kim, S. (2010). Protection profile for secure e-voting systems. In Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings (pp. 386-397). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6047 LNCS). https://doi.org/10.1007/978-3-642-12827-1_28