Electronic Voting Pages
 
   HOME                                                                                                                                                                                                                                                           
     TECHNICAL PAPERS ON E-VOTING   
 
E-VOTING PAGES

 Academic papers
 News
 Technical papers
 Dutch pages
 Researchers
 Blogs and Mailinglists
 Forum

 
Links

SPECIAL TOPICS

 Campaign

ABOUT ME

 Contact

 

 

Part of this list of technical articles is compiled by our TRUE-VOTE colleagues at the Computer Science Department (Dipartimento di Scienze dell'Informazione - DSI) of the University of Milan, Italy. We thank them for their input!

 

  • Australian Capital Territory Electoral Commission. (2001) Source Code for the Software (zip file) for the electronic voting and counting system (EVACS) was built and is owned by Software Improvements.

  •  

  • Aronsson H. (1995) Zero Knowledge Protocols and Small Systems. Department of Computer Science Helsinki University of Technology.

  •  

  • Burmester, M., V. Chrissikopoulos and E. Magkos (2001) Receipt-freeness in Large-Scale Elections without Untappable Channels.

  •  

  • Chaum, D. (2004) Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy, January/February 2004.

  •  

  • Chaum, D. (1981) Untraceable electronic mail, return address, and digital pseudonyms. Communication of the ACM, Vol.24, pp.84-88, ACM Press.

  •  

  • Chaum, D. (1982) Blind signatures for untraceable payments. Advances in Cryptology, CRYPTO'82, Lectures Notes in Computer Science, pp. 199-203, Springer-Verlag.

  •  

  • Chaum, D. (1989) Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. Advances in Cryptology, EUROCRYPT'89", pp.177-182.

  •  

  • Chaum, D. and T. Peterson (1993) Wallet databases with observers. Proceedings of CRYPTO'92, LNCS, Springer-Verlag, pp. 89-105

  •  

  • Cranor, L. and R. Cytron (1997) Sensus: A Security-Conscious Electronic Polling System for the Internet. Proceedings of the Hawaii International Conference on System Sciences.

  •  

  • Cohen, J. (1986) Improving Privacy in Cryptographic Elections. Yale University, Feb 1986.

  •  

  • Cohen, J. and M. Fisher (1985) A Robust and Verifiable Cryptographically Secure Election Scheme. Yale University.

  •  

  • Cohen, J., (J. Benaloh) and Tuinstra (1994) Receipt-Free Secret-Ballot Elections Proceedings of the Twenty-sixth Annual ACM Symposium on the Theory of Computing, pp. 544-553, May 1994.

  •  

  • Cramer, R., R. Gennaro and B. Schoenmakers (1997) A Secure and Optimally Efficient Multi-Authority Election Scheme. Proceedings of EUROCRYPT'97.

  •  

  • Department of the Environment, Ireland (2004) An interactive demonstration shows you how the electronic voting is done in the Irish electronic system.

  •  

  • Diebold Election Systems (2003) Checks and Balances in elections equipment and procedures prevent alleged fraud scenarios.

  •  

  • DuRette, B. (1999) Multiple Administrators for Elections. May 1999.

  •  

  • Diffie W. and M. Hellman (1976) New Directions in Cryptography. IEEE Transactions on information Theory, Vol. 22, pp. 644-654, 1976

  •  

  • ElGamal, T. (1985) A Public-Key Cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, No. IT-31, pp. 469-472, 1985.

  •  

  • Fujioka, A., T. Okamoto and K. Ohta (1993) A practical Secret Voting Scheme for Large Scale Elections. Advances in Cryptology - AUSCRYPT '92.

  •  

  • Herschberg, M. (1997) Secure Electronic Voting Over the World Wide Web.

  •  

  • IEEE Voting Equipment Standards, Project 1583. Project P1583 is charged with development of a standard of requirements and evaluation methods for election voting equipment. The standard will provide technical specifications for electronic, mechanical, and human factors that can be used by manufacturers of voting machines or by those purchasing such machines.

  •  

  • Itoh, K., K. Kurosawa and C. Park (1993) Efficient Anonymous Channel and All/Nothing Election Scheme. Advances in Cryptology: Proc. of EuroCrypt'93, LNCS 765, Springer-Verlag, pp. 248-259, 1993.

  • Joaquim, R., A. Zúquete and P.Ferreira (2003) REVS - A Robust Electronic Voting System.


  • IADIS International Journal of WWW/Internet. Vol. 1, N. 2. Dec 2003.

  • Karro, J. and J. Wang (1999) Towards a Practical, Secure and Very Large Scale Online Election. Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

  •  

  • Keller, A.,  A. Dechert, K. Auerbach, D. Mertz, A. Pearl, and J. Lorenzo Hall, "A PC-Based Open-Source Voting Machine with an Accessible Voter-Verifiable Paper Ballot," USENIX '05, FREENIX track, April 10-15, 2005, Anaheim, California.

  •  

  • Killian, J. and K. Sako (1995) Receipt-Free Mix-Type Voting Scheme; a practical solution to the implementation of a voting booth. Proceedings of EUROCRYPT '95, LNCS, Springer Verlag, pp. 393-403, 1995.

  •  

  • Kohno, T., Stubbefield, A. Rubin, A., Wallach, D. (2003) Analysis of an Electronic Voting System. John Hopkins Information Security Institute technical Report TR-2003-19, July 23, 2003.

  •  

  • Lebre, R., R. Joaquim, A. Zúquete and P. Ferreira (2004) Internet Voting: Improving Resistance to Malicious Servers. IADIS International Conference Applied Computing 2004. March 23-26, 2004. Lisboa, Portugal.

  •  

  • Neff, C. (2001) A Verifiable Secret Shuffle and its Application to E-Voting. August 2001

  •  

  • Nurmi, L., A. Salomaa and L. Santean (1991) Secret Ballot Elections in Computer Networks. Computers & Security 36, Vol. 10, pp. 553-560, 1991

  •  

  • Pfitzmann, B. (1995) Breaking an Efficient Anonymous Channel. EUROCRYPT'94, LNCS 950, Springer-Verlag, pp. 332-340, 1995

  •  

  • Pfitzmann, A. and B. Pfitzmann (1989) How to break the direct RSA-implementation of mixes. Advances in Cryptology-Eurocrypt '89, pp. 373-381, 1989

  •  

  • Radwin, R. (1995) An Untraceable, Universally Verifiable Voting Scheme. Seminar in Cryptology, 1995.

  •  

  • Riera, A. and P. Brown (2003) Applied Cryptography Enabling Trustworthy Electronic Voting. Workshop on Voter Verifiable Elections, Denver, July 2003.

  •  

  • Riera, A., P. Brown and J. A. Ortega (2003) Advanced Security to Enable Trustworthy Electronic Voting. 3rd European Conference on e-Government. Trinity College , Dublin , June 2003.

  •  

  • Riera, A., J. Rifà and J. Borrell (1999) Efficient Construction of Vote-Tags to Allow Open Objection to the Tally in Electronic Elections. Information Processing -Andreu Riera , Joan Borrell. Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. Proceedings of the 1999 Network and Distributed Systems Security Symposium (NDSS'99), pp. 69-82. ISBN 1-891562-04-5, Internet Society, Reston , VA , 1999.

  •  

  • Riera  A., J. Borrell and J. Rifà (1998) An Uncoercible Verifiable Electronic Voting Scheme. Proceedings of the IFIP TC11 14th International Conference on Information Security (SEC'98), pp. 349-362. ISBN 03-85403-116-5, Austrian Computer Society, Vienna, 1998.

  •  

  • Riera  A., J. Borrell and J. Rifà (1998) Large Scale Elections by Coordinating Electoral Colleges. Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC'97), pp. 349-362. ISBN 0-412-81780-2, Chapman & Hall, London, 1997.

  •  

  • Rubin, A. (2003) Response to Diebold’s Technical Analysis.

  •  

  • Schneier, B. (1994) Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, pp. 191-204, 1994

  •  

  • Schneier, B. (1996) Applied cryptography : protocols, algorithms and source code in C. Edition 2, Chichester: John Wiley, 1996.

  •  

  • Schoenmakers, B. (2000) Compensating for lack of transparency. Proc. of the 10th Conference on Computers, Freedom and Privacy, April 2000, pp.231-233, ACM.

  •  

  • Schoenmakers, B. (2000) Fully Auditable Electronic Secret-Ballot Elections.

  •  

  • Shamir, A. (1979) How to share a secret. Communication of the ACM, Vol.22(11), pp. 612-613, 1979.

  •  

Black Box Voting: Ballot-tampering in the 21st Century
Bev Harris


Results of the TRUE-VOTE electronic voting project
A short article about the IST project TruE-Vote has been published on the IST results website to promote the findings to a wider audience.

Over 3.6 billion euros have been spent on thousands of near-market projects by the European Commission’s Information Society Technologies (IST) research initiative with more investment planned for the future.

The IST Results service gives you online news and analysis on the emerging results from Information Society Technologies research. The service reports on prototype products and services ready for commercialisation as well as work in progress and interim results with significant potential for exploitation.