Security Analysis of the Geneva E-Voting System
نویسنده
چکیده
The Swiss democracy, which is a direct democracy, carries out up to five referenda a year. This causes that 95 % of the Geneva voters use postal voting instead of going to the polling station. In 2001 the Cantons of Geneva, Neuchâtel and Zurich decided to start pilot projects in electronic voting (e-voting). Although the Canton of Geneva published more and more information about their system, an independent security analysis about it has neither been conducted nor published. This paper analyzes the system based on the available information and identifies vulnerable points at the components and on the communication channel between them. At each vulnerable point, we analyze whether the security requirements from the Swiss state chancellery which are based on the requirements of free, equal and secret elections, are violated. If an obvious solution for a security problem exists, it will also be illustrated. Two main problems are the security of the client-PC and the Internet connection of this PC. The system does not try to solve the trusted platform problem and it is not possible to solve it without introducing additional components.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAn improved approach for ranking the candidates in a voting system based on efficiency intervals
This paper proposes improvements and revisions to a recent approach in a voting system, and provides an effective approach with a stronger discriminate power. For this purpose, the advantage of a linear transformation is utilized to redene a previously used concept of virtual worst candidate, by incorporating the existing weight restrictions. Then, the best score of this virtual candidate is us...
متن کاملDesign and Analysis of a Practical E-Voting Protocol
In this paper we design an e-voting protocol for an academic voting system which should be independent from other university applications. We briefly discuss security requirements for e-voting schemes focusing on our proposed scheme. We design a receipt-free e-voting protocol which requires neither anonymous channel nor other physical assumptions. We give a short survey on formal analysis of e-...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملSecurity Aspects of Electronic Voting Systems
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: on-line, e.g. via Internet, and offline, by using a voting machine or an electronic polling booth. Security is the main challenge of e-voting. This is the reason why designing a secure e-voting system is very im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013