Protection profile for secure e-voting systems

Kwangwoo Lee, Yunho Lee, Dongho Won, Seung-Joo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages386-397
Number of pages12
Volume6047 LNCS
DOIs
Publication statusPublished - 2010 Dec 23
Externally publishedYes
Event6th International Conference on Information Security Practice and Experience, ISPEC 2010 - Seoul, Korea, Republic of
Duration: 2010 May 122010 May 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6047 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other6th International Conference on Information Security Practice and Experience, ISPEC 2010
CountryKorea, Republic of
CitySeoul
Period10/5/1210/5/13

    Fingerprint

Keywords

  • Common criteria
  • e-voting system
  • Evaluation
  • Protection profile
  • Verifiability
  • Voter verifiable audit trail

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Lee, K., Lee, Y., Won, D., & Kim, S-J. (2010). Protection profile for secure e-voting systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6047 LNCS, pp. 386-397). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6047 LNCS). https://doi.org/10.1007/978-3-642-12827-1_28