Development, Formal Verification, and Evaluation of an E-Voting System With VVPAT
The use of new technologies to support voting has been and is the subject of great debate. Several people advocate the benefits it can bring-such as improved speed and accuracy in counting, accessibility, voting from home-and as many are concerned with the risks it poses, such as unequal access (dig...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 4; no. 4; pp. 651 - 661 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.12.2009
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The use of new technologies to support voting has been and is the subject of great debate. Several people advocate the benefits it can bring-such as improved speed and accuracy in counting, accessibility, voting from home-and as many are concerned with the risks it poses, such as unequal access (digital divide), violation to secrecy and anonymity, alteration of the results of an election (because of malicious attacks, bad design/coding, or procedural weaknesses). The attitude of different governments towards electronic voting (e-voting) varies accordingly. In this paper, we present the activities related to the development and formal verification of an e-voting system, called ProVotE. ProVotE is an end-to-end e-voting system with a voter verified paper audit trial, developed within the framework of a larger initiative whose goal is assessing the feasibility of introducing e-voting in the Autonomous Province of Trento. ProVotE has been used in trials and elections with legal value in Italy. What we believe to be of interest is the approach we took for its development, which has been based on a participatory design for the definition of the voter interface, on the usage of formal methods and model checking for the validation of the core logic of the machine, on open source components, and on the formal analysis of some critical procedures related to the usage of the machine during the election. |
---|---|
AbstractList | Several people advocate the benefits it can bring-such as improved speed and accuracy in counting, accessibility, voting from home-and as many are concerned with the risks it poses, such as unequal access (digital divide), violation to secrecy and anonymity, alteration of the results of an election (because of malicious attacks, bad design/coding, or procedural weaknesses). The use of new technologies to support voting has been and is the subject of great debate. Several people advocate the benefits it can bring-such as improved speed and accuracy in counting, accessibility, voting from home-and as many are concerned with the risks it poses, such as unequal access (digital divide), violation to secrecy and anonymity, alteration of the results of an election (because of malicious attacks, bad design/coding, or procedural weaknesses). The attitude of different governments towards electronic voting (e-voting) varies accordingly. In this paper, we present the activities related to the development and formal verification of an e-voting system, called ProVotE. ProVotE is an end-to-end e-voting system with a voter verified paper audit trial, developed within the framework of a larger initiative whose goal is assessing the feasibility of introducing e-voting in the Autonomous Province of Trento. ProVotE has been used in trials and elections with legal value in Italy. What we believe to be of interest is the approach we took for its development, which has been based on a participatory design for the definition of the voter interface, on the usage of formal methods and model checking for the validation of the core logic of the machine, on open source components, and on the formal analysis of some critical procedures related to the usage of the machine during the election. |
Author | Villafiorita, A. Weldemariam, K. Tiella, R. |
Author_xml | – sequence: 1 givenname: A. surname: Villafiorita fullname: Villafiorita, A. organization: Center for Sci. & Technol. Res. (IRST), Found. Bruno Kessler (FBK), Trento, Italy – sequence: 2 givenname: K. surname: Weldemariam fullname: Weldemariam, K. organization: Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy – sequence: 3 givenname: R. surname: Tiella fullname: Tiella, R. organization: Center for Sci. & Technol. Res. (IRST), Found. Bruno Kessler (FBK), Trento, Italy |
BookMark | eNpdkE1PwkAQhjcGEwH9AcbLxosXivvRrt0jQVASEzVgPW52t1MtabvYbUn49xYhHLzMV953MvMMUK9yFSB0TcmYUiLvV4v5cswIkV3goST8DPVpFIlAEEZ7p5ryCzTwfk1IGFIR99H7I2yhcJsSqmaE564udYETqPMst7rJXTXCukrxbKuL9q_HLusmeBYkrsmrL7zc-QZK_Jk33zhJ3iarS3Se6cLD1TEP0cd8tpo-By-vT4vp5CWwnIVNEPKIpxmVGTPaEJCSa8asYYKA7R5KmeQkFhYyFppIWAPmwXCaccOJTXXI-BDdHfZuavfTgm9UmXsLRaErcK1XsZAxl7xDMUS3_5Rr19ZVd5yKIxFLwYjoRPQgsrXzvoZMbeq81PVOUaL2iNUesdojVkfEnefm4MkB4KSPmOw4c_4L14t4AA |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_1016_j_jss_2011_03_032 crossref_primary_10_1016_j_cose_2012_08_001 crossref_primary_10_1016_j_infsof_2012_04_008 crossref_primary_10_4018_jisp_2013040101 crossref_primary_10_1007_s12243_016_0525_8 crossref_primary_10_4018_jea_2012040102 crossref_primary_10_1016_j_jnca_2021_103165 crossref_primary_10_4018_IJSI_309731 crossref_primary_10_1016_j_jss_2011_01_064 crossref_primary_10_1145_3041041 crossref_primary_10_7763_IJIEE_2013_V3_295 |
Cites_doi | 10.1109/CRISIS.2008.4757486 10.1145/1022594.1022623 10.1109/MSP.2008.62 10.1109/ARES.2006.56 10.1109/ARES.2007.124 10.1109/CEC-EEE.2007.42 10.1145/1297797.1297827 10.1109/MSP.2008.56 10.1145/1052220.1052288 10.1007/978-1-4615-0239-5_1 10.1007/978-3-540-77493-8_4 10.1109/DEXA.2003.1232067 10.1109/ICIW.2008.77 10.1145/195058.195407 10.1007/978-3-540-31987-0_14 10.1145/1294325.1294338 10.1007/978-3-540-30078-6_39 10.1109/WECWIS.2001.933922 10.1007/3-540-45657-0_29 10.1109/SECPRI.2004.1301313 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
DOI | 10.1109/TIFS.2009.2034903 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Law Computer Science |
EISSN | 1556-6021 |
EndPage | 661 |
ExternalDocumentID | 2291737251 10_1109_TIFS_2009_2034903 5290133 |
Genre | orig-research |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AASAJ ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AKJIK ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
ID | FETCH-LOGICAL-c324t-4353df19f2bab0e993a22cb260ec109d293086cef24b56cbeb7b31f3b30cda423 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Sat Aug 17 01:30:41 EDT 2024 Thu Oct 10 17:22:13 EDT 2024 Fri Aug 23 02:36:34 EDT 2024 Wed Jun 26 19:26:54 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c324t-4353df19f2bab0e993a22cb260ec109d293086cef24b56cbeb7b31f3b30cda423 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 856896206 |
PQPubID | 85506 |
PageCount | 11 |
ParticipantIDs | proquest_journals_856896206 crossref_primary_10_1109_TIFS_2009_2034903 ieee_primary_5290133 proquest_miscellaneous_869839390 |
PublicationCentury | 2000 |
PublicationDate | 2009-12-01 |
PublicationDateYYYYMMDD | 2009-12-01 |
PublicationDate_xml | – month: 12 year: 2009 text: 2009-12-01 day: 01 |
PublicationDecade | 2000 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2009 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref34 ref12 ref37 (ref23) 2001 ref36 ref14 myagmar (ref5) 2005 ref30 kremer (ref25) 2005; 3444 ref33 gamma (ref24) 1995 royce (ref17) 1970 (ref7) 0 oostveen (ref3) 2004 sastry (ref43) 2006 gardner (ref32) 2007 ref1 ref39 weldemariam (ref15) 2008 delaune (ref45) 2008 (ref8) 2004 cimatti (ref18) 2002 lambrinoudakis (ref2) 2003 xenakis (ref29) 2004 chaum (ref42) 2008 bishop (ref28) 2007; 50 fujioka (ref38) 1993 volkamer (ref31) 2007 ref46 sastry (ref26) 2007 yee (ref44) 2007 ref20 rivest (ref22) 2006 xia (ref41) 2008 buzzi (ref11) 2006 (ref6) 0 prosser (ref19) 2004 ref27 ray (ref40) 2001 ref9 ref4 (ref21) 2005; 5 bartel (ref16) 2008 balzarotti (ref35) 2008 caporusso (ref10) 2006; 86 |
References_xml | – ident: ref14 doi: 10.1109/CRISIS.2008.4757486 – start-page: 73 year: 2004 ident: ref3 article-title: security as belief user's perceptions on the security of e-voting systems publication-title: Electronic Voting in Europe contributor: fullname: oostveen – year: 2001 ident: ref23 publication-title: OMG Unified Modeling Language Specification – start-page: 237 year: 2008 ident: ref35 article-title: are your votes really counted? testing the security of real-world electronic voting systems publication-title: Proc Int Symp Software Testing and Analysis (ISSTA) contributor: fullname: balzarotti – ident: ref9 doi: 10.1145/1022594.1022623 – year: 2007 ident: ref31 article-title: independent audits of remote electronic votingdeveloping a common criteria protection profile publication-title: Proc EDEM 2007Elektronische Demokratie in sterreich contributor: fullname: volkamer – ident: ref36 doi: 10.1109/MSP.2008.62 – ident: ref1 doi: 10.1109/ARES.2006.56 – start-page: 244 year: 1993 ident: ref38 article-title: a practical secret voting scheme for large scale elections publication-title: Proc Workshop on the Theory and Application of Cryptographic Techniques (ASIACRYPT'92) contributor: fullname: fujioka – ident: ref4 doi: 10.1109/ARES.2007.124 – ident: ref27 doi: 10.1109/CEC-EEE.2007.42 – start-page: 11 year: 2007 ident: ref32 article-title: on the difficulty of validating voting machine software with software publication-title: Proc Usenix Accurate Electronic Voting Technology on Usenix/Accurate Electronic Voting Technology Workshop (EVT 07) contributor: fullname: gardner – volume: 50 start-page: 120 year: 2007 ident: ref28 article-title: risks of e-voting publication-title: Commun ACM doi: 10.1145/1297797.1297827 contributor: fullname: bishop – ident: ref37 doi: 10.1109/MSP.2008.56 – year: 2004 ident: ref8 publication-title: Legal Operational and Technical Standards for e-Voting – ident: ref20 doi: 10.1145/1052220.1052288 – ident: ref33 doi: 10.1007/978-1-4615-0239-5_1 – volume: 5 year: 2005 ident: ref21 publication-title: Procedural Security and Social Acceptance in E-Voting – year: 1995 ident: ref24 publication-title: Design Patterns contributor: fullname: gamma – ident: ref13 doi: 10.1007/978-3-540-77493-8_4 – start-page: 467 year: 2003 ident: ref2 article-title: electronic voting systems: security implications of the administrative workflow publication-title: Proc 14th Int l Workshop Database and Expert Systems Applications (Dexa 03) doi: 10.1109/DEXA.2003.1232067 contributor: fullname: lambrinoudakis – volume: 86 start-page: 191 year: 2006 ident: ref10 article-title: transition to electronic voting and citizen participation publication-title: Electronic Voting contributor: fullname: caporusso – year: 2008 ident: ref15 article-title: modeling and analysis of procedural security in (e)voting: the trentino's approach and experiences publication-title: Proc USENIX/Accurate Electron Voting Technol on USENIX/Accurate Electron Voting Technol Workshop (EVT'08) contributor: fullname: weldemariam – year: 0 ident: ref7 publication-title: 2005 Voluntary Voting System Guidelines – year: 0 ident: ref6 publication-title: 2002 Voting System Standards – year: 2006 ident: ref22 publication-title: On the Notion of Software Independence in Voting Systems contributor: fullname: rivest – start-page: 94 year: 2005 ident: ref5 article-title: threat modeling as a basis for security requirements publication-title: StorageSS '05 Proceedings of the 2005 ACM workshop on Storage security and survivability contributor: fullname: myagmar – ident: ref46 doi: 10.1109/ICIW.2008.77 – start-page: 1 year: 2008 ident: ref42 article-title: scantegrity ii: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes publication-title: Proc Conf Electronic Voting Technology (EVT'08) contributor: fullname: chaum – ident: ref39 doi: 10.1145/195058.195407 – year: 2008 ident: ref16 publication-title: XML Signature Syntax and Processing (Second Edition) w3c Recommendation contributor: fullname: bartel – volume: 3444 start-page: 186 year: 2005 ident: ref25 article-title: analysis of an electronic voting protocol in the applied pi-calculus publication-title: Programming Languages and SystemsProc 14th Eur Symp Programming (ESOP'05) doi: 10.1007/978-3-540-31987-0_14 contributor: fullname: kremer – year: 2006 ident: ref43 article-title: designing voting machines for verification publication-title: Proc 15th Conf USENIX Security Symp (USENIX-SS'06) contributor: fullname: sastry – ident: ref12 doi: 10.1145/1294325.1294338 – year: 2008 ident: ref45 publication-title: Verifying Privacy-type Properties of Electronic Voting Protocols contributor: fullname: delaune – ident: ref30 doi: 10.1007/978-3-540-30078-6_39 – start-page: 5 year: 2007 ident: ref44 article-title: extending prerendered-interface voting software to support accessibility and other ballot features publication-title: Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT'07) contributor: fullname: yee – start-page: 188 year: 2001 ident: ref40 article-title: an anonymous electronic voting protocol for voting over the internet publication-title: Proc Third Int'l Workshop Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01) doi: 10.1109/WECWIS.2001.933922 contributor: fullname: ray – start-page: 116 year: 2004 ident: ref29 article-title: levels of difficulty in introducing e-voting publication-title: EGOV contributor: fullname: xenakis – start-page: 359 year: 2002 ident: ref18 article-title: nusmv 2: an open source tool for symbolic model checking publication-title: Proc 14th Int Conf Computer-Aided Verification (CAV'02) doi: 10.1007/3-540-45657-0_29 contributor: fullname: cimatti – year: 2007 ident: ref26 publication-title: Verifying Security Properties in Electronic Voting Machines contributor: fullname: sastry – year: 2006 ident: ref11 article-title: translating void and null ballots from paper to touchscreen publication-title: Proc Towards e-Democracy Participation Deliberation Communities contributor: fullname: buzzi – start-page: 1 year: 2008 ident: ref41 article-title: analysis, improvement and simplification of prt voter with paillier encryption publication-title: Proc Conf Electronic Voting Technology (EVT'08) contributor: fullname: xia – start-page: 171 year: 2004 ident: ref19 article-title: security assets in e-voting publication-title: Electronic Voting in Europe contributor: fullname: prosser – start-page: 1 year: 1970 ident: ref17 article-title: managing the development of large software systems publication-title: Proc IEEE WESCON contributor: fullname: royce – ident: ref34 doi: 10.1109/SECPRI.2004.1301313 |
SSID | ssj0044168 |
Score | 2.1292748 |
Snippet | The use of new technologies to support voting has been and is the subject of great debate. Several people advocate the benefits it can bring-such as improved... Several people advocate the benefits it can bring-such as improved speed and accuracy in counting, accessibility, voting from home-and as many are concerned... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 651 |
SubjectTerms | Design engineering Development E-voting Elections Electronic voting electronic voting (e-voting) Electronic voting systems Electronics Formal method formal specification and verification Formal verification Law Legal factors Logic Nominations and elections Protection ProVotE Security security assessment Source code Switches Voters Voting Voting machines Welding |
Title | Development, Formal Verification, and Evaluation of an E-Voting System With VVPAT |
URI | https://ieeexplore.ieee.org/document/5290133 https://www.proquest.com/docview/856896206 https://search.proquest.com/docview/869839390 |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fT9swED5RnsbDgAJa-TH5YU9TUxI7TuPHCrWCaUybKIW3KHbOAoESBKmQ-Os5J05VsT3sLXIsy_Kd7e98d98BfBMqRbIrGtegCWJS4UClCgOuZSwKqchwcQnOl7-S8-v4x6283YDhKhcGEZvgMxy5z8aXX1Rm6Z7KTqVz-gnRg95YqTZXqzt16VZv096kTAIyMoT3YEahOp1fzK5aZkru2Fi6-lj-DmqKqvx1EjfXy2wbLruJtVElD6NlrUfm7QNn4__OfAc-e5zJJq1i7MIGln3Y7mo4ML-l-7C1RkjYh97P_HUP_qxFEg3ZzKHaR7agLtY_8A1ZXhZsuiIKZ5WlFjYNFpWLomYtDTq7ua_v2GLxezLfh-vZdH52HvjSC4EhhFWT0KQobKQs17kOkUBMzrnRZPygoSUtCCSQLWTQ8ljLxGjUYy0iK7QITZETRDuAzbIq8Quw3DGeGatiYYt4jJhiZDWNrYsxtxbTAXzvhJE9tQwbWWOZhCpzknOFMlXmJTeAPbe4q45-XQdw1Ikv83vwJUtlkqqEh8kA2OovbR7nEclLrJbUJVEEEIUKD_897hF84r5eRBgdw2b9vMQTAiG1_tpo3ztYBNdN |
link.rule.ids | 315,783,787,799,27938,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1RT9swED5B9zD2MLYCWsfG_MATakpix2n8iKZWBVoEonS8RbFzFtOmZNpSTdqv3zlxKsT2wFvkWJblO9vf-e6-AzgWKkWyKxrXoAliUuFApQoDrmUsCqnIcHEJzourZHYXX9zL-y0YbnJhELEJPsOR-2x8-UVl1u6p7FQ6p58Q2_BCOlzRZmt15y7d623im5RJQGaG8D7MKFSny_PpbctNyR0fS1chy99CTVmVf87i5oKZ7sKim1obV_JttK71yPx5wtr43Lm_gdceabKzVjXewhaWfdjtqjgwv6n78OoRJWEftuf57z24eRRLNGRTh2u_sxV1sf6Jb8jysmCTDVU4qyy1sEmwqlwcNWuJ0NmXr_UDW62uz5b7cDedLD_PAl98ITCEsWoSmxSFjZTlOtchEozJOTeazB80tKQFwQSyhgxaHmuZGI16rEVkhRahKXICaQfQK6sS3wHLHeeZsSoWtojHiClGVtPYuhhzazEdwEknjOxHy7GRNbZJqDInOVcqU2VecgPYc4u76ejXdQCHnfgyvwt_ZalMUpXwMBkA2_yl7eN8InmJ1Zq6JIogolDh-_-P-wlezpaLeTY_v7o8hB3uq0eE0Qfo1T_X-JEgSa2PGk38C8aW2po |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development%2C+Formal+Verification%2C+and+Evaluation+of+an+E-Voting+System+With+VVPAT&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Villafiorita%2C+A.&rft.au=Weldemariam%2C+K.&rft.au=Tiella%2C+R.&rft.date=2009-12-01&rft.issn=1556-6013&rft.volume=4&rft.issue=4&rft.spage=651&rft.epage=661&rft_id=info:doi/10.1109%2FTIFS.2009.2034903&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIFS_2009_2034903 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |