Browse by author
Lookup NU author(s): Professor Peter Ryan,
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
It is widely recognised that the security of even the best-designed technical systems can be undermined by socio-technical weaknesses that stem from implementation flaws, environmental factors that violate (often implicit) assumptions and human fallibility. This is especially true of cryptographic voting systems, which typically have a large user base and are used infrequently. In the spirit of the this observation, Karlof et al  have performed an analysis of the Chaum  and Neff  schemes from the "systems perspective". By stepping outside the purely technical, protocol specifications, they identify a number of potential vulnerabilities of these schemes. In this paper, we perform a similar analysis of the Prêt à Voter . Firstly, we examine the extent to which the vulnerabilities identified in  apply to Prêt à Voter. We then describe some further vulnerabilities and threats not identified in . Some of these, such as chain-voting attacks, do not apply to the Chaum or Neff schemes, but are a potential threat in Prêt à Voter, or indeed any crypto system with pre-printed ballot forms. Where appropriate, we propose enhancements and counter-measures. Our analysis shows that Prêt à Voter is remarkably robust against a large class of socio-technical vulnerabilities, including those described in . © 2010 Springer-Verlag.
Author(s): Ryan P, Peacock T
Editor(s): Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B.
Publication type: Book Chapter
Publication status: Published
Book Title: Towards Trustworthy Elections: New Directions in Electronic Voting
Print publication date: 01/01/2010
Series Title: Lecture Notes in Computer Science
Place Published: Berlin; New York
Library holdings: Search Newcastle University Library for this item