116 research outputs found

    Towards improving the efficacy of code-based verification in internet voting

    Get PDF
    End-to-end verifiable Internet voting enables a high level of election integrity. Cast-as-intended verification, in particular, allows voters to verify that their vote has been correctly cast, even in the presence of malicious voting devices. One cast-as-intended verification approach is code-based verification, used since 2015 in legally-binding Swiss elections. We evaluated the Swiss paper-based polling sheet and voting interface, focusing on how well it supported voters in verifying their votes. We uncovered several potential issues related to manipulation detection. We improved the paper-based polling sheet and voting interface accordingly. Then, we carried out a between-subjects lab study with 128 participants to compare the original and improved sheet and interface wrt. usability and its effectiveness in supporting manipulation detection. Our improvements significantly enhanced detection. Our study delivered insights into participants’ somewhat ineffectual reactions to detected anomalies, i.e. starting over again and trying to cast the same vote again, or calling the telephone number provided by the interface. This problem is likely to manifest in any verifiable voting system and thus needs to be addressed as future work

    HCI in e-Government and e-Democracy

    Full text link
    This chapter introduces the application of HCI design processes and design principles in e-government and e-democracy. We elaborate on HCI design processes and six HCI design principles in the context of e-government and e-democracy, including citizen-centered design, usability, accessibility, access to information, transaction efficiency, and security and privacy. Then, we present two cases to demonstrate the value of applying the HCI processes and design principles in developing and deploying e-government and e-democracy. Finally, we highlight the challenges faced by e-government and e-democracy as well as the future trends. In conclusion, HCI can help the success of e-government and e-democracy and their future growth

    Usable Verifiable Secrecy-Preserving E-Voting

    Get PDF
    In this paper we propose the usage of QR-Codes to enable usable veriable e-voting schemes based on code voting. The idea { from a voter\u27s perspective { is to combine code voting proposed by Chaum with the cast-as-intended verication mechanism used e.g. in Switzerland (using a personal initialization code, return codes per option, a conrmation code and a nalisation code); while all codes to be entered into the e-voting system by voters are available as QR-Code (i.e. one personalised QR voting code per voting option and one personal conrmation QR-Code). We conduct a user study to evaluate the usability and user experience of such an approach: both the code sheets and the election webpage are based on usability research in this area but adopted for our idea. As our proposal performs good wrt. usability, we discuss how such usable front-ends enable more secure e-voting systems in respect to end-to-end veriability and vote secrecy

    A Framework for QKD-based Electronic Voting

    Get PDF
    This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level of security that can be very beneficial for some significant e-voting tasks. Moreover, a framework for the integration of the QKD with the e-voting system is proposed. The Helios voting system, which is considered as one of the open-source and major voting systems, has been chosen for this integration. Investigation of the main design aspects of building a QKD-based e-voting system has been done. Thus, the expected advantages and limitations of the proposal are discussed and analyzed

    Mental Models of Verifiability in Voting

    Get PDF
    In order for voters to verify their votes, they have to carry out additional steps besides selecting a candidate and submitting their vote. In previous work, voters have been found to be confused about the concept of and motivation for verifiability in electronic voting when confronted with it. In order to better communicate verifiability to voters, we identify mental models of verifiability in voting using a questionnaire distributed online in Germany. The identified mental models are Trusting No Knowledge Observer Personal Involvement and Matching models. Within the same survey, we identify terms that can be used in place of ‘verify’ as well as security-relevant metaphors known to the voters that can be used to communicate verifiability
    • …
    corecore