TY - GEN
T1 - Protection profile for secure e-voting systems
AU - Lee, Kwangwoo
AU - Lee, Yunho
AU - Won, Dongho
AU - Kim, Seungjoo
N1 - Funding Information:
This work was supported by the University IT Research Center Project funded by the Korea Ministry of Information and Communication.
PY - 2010
Y1 - 2010
N2 - In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.
AB - In this paper, we propose a protection profile for e-voting systems. Currently, there are three protection profiles for e-voting systems, BSI-PP-0031 in Germany, PP-CIVIS in France, and IEEE P1583 in USA. Although these protection profiles consider the overall security requirements for e-voting systems, they did not consider the voter verifiable audit trail. The voter verifiable audit trail allows voters to verify that their votes were captured correctly. Moreover, it provides a means to audit the stored electronic results, and to detect possible election fraud. Today, several voter verifiable audit trail e-voting systems already exist in the market, and used in public elections. However, a protection profile does not reflect this situation. Therefore, it is required that a protection profile for e-voting systems should consider the voter verifiability. To accomplish this, we propose a protection profile considering the voter verifiability with the existing protection profiles, and then discuss voter verifiability issues related to the electoral process. The proposed protection profile can be used to increase reliability of the entire e-voting process and tabulation result.
KW - Common criteria
KW - Evaluation
KW - Protection profile
KW - Verifiability
KW - Voter verifiable audit trail
KW - e-voting system
UR - http://www.scopus.com/inward/record.url?scp=78650258231&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-12827-1_28
DO - 10.1007/978-3-642-12827-1_28
M3 - Conference contribution
AN - SCOPUS:78650258231
SN - 3642128262
SN - 9783642128264
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 386
EP - 397
BT - Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings
T2 - 6th International Conference on Information Security Practice and Experience, ISPEC 2010
Y2 - 12 May 2010 through 13 May 2010
ER -