UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System

09/05/2021
by   Bingsheng Zhang, et al.
0

Estonian Internet voting has been used in national-wide elections since 2005. However, the system was initially designed in a heuristic manner, with very few proven security guarantees. The Estonian Internet voting system has constantly been evolving throughout the years, with the latest version (code-named IVXV) implemented in 2018. Nevertheless, to date, no formal security analysis of the system has been given. In this work, for the first time, we provide a rigorous security modeling for the Estonian IVXV system as a ceremony, attempting to capture the effect of actual human behavior on election verifiability in the universal composability (UC) framework. Based on the voter behavior statistics collected from three actual election events in Estonia, we show that IVXV achieves end-to-end verifiability in practice despite the fact that only 4% (on average) of the Estonian voters audit their ballots.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/24/2019

An Attack on the the Encryption Scheme of the Moscow Internet Voting System

The next Moscow City Duma elections will be held on September 8th with a...
research
08/04/2023

Improving the Security of United States Elections with Robust Optimization

For more than a century, election officials across the United States hav...
research
09/23/2019

Modeling Peoples Voting Behavior with Poll Information

Despite the prevalence of voting systems in the real world there is no c...
research
05/19/2018

Predicting Strategic Voting Behavior with Poll Information

The question of how people vote strategically under uncertainty has attr...
research
07/10/2019

Pakistan's Internet Voting Experiment

Pakistan recently conducted small-scale trials of a remote Internet voti...
research
05/31/2021

User Experience Design for E-Voting: How mental models align with security mechanisms

This paper presents a mobile application for vote-casting and vote-verif...
research
07/24/2020

Natural Strategic Abilities in Voting Protocols

Security properties are often focused on the technological side of the s...

Please sign up or login with your details

Forgot password? Click here to reset