Electronic Voting: Second International Joint Conference, e-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings
In: Lecture Notes in Computer Science Ser. v.10615
Intro -- Preface -- Organization -- Contents -- Election Security and Economics: It's All About Eve -- 1 Introduction -- 2 General Approaches -- 2.1 Information Security -- 2.2 Economics -- 3 Voting Protocols -- 3.1 Simple Voting Protocol -- 3.2 Random Sample Elections -- 4 Information Security Analysis -- 4.1 Adversary -- 4.2 Security Properties -- 5 Economic Perspective -- 5.1 Economic Analysis -- 5.2 Implicit Security Properties -- 5.3 Vote Buying -- 6 Outlook -- References -- Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations -- 1 Introduction -- 2 Verifiability -- 2.1 E2E Verifiability -- 2.2 Individual and Universal Verifiability -- 2.3 Not Sufficient -- 2.4 Not Necessary -- 3 Accountability -- 4 Coercion-Resistance and Privacy -- 5 Limitations of Cryptographic Security Analysis -- 6 Conclusion -- References -- Voting in E-Participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees -- Abstract -- 1 Introduction -- 1.1 Background: The Elections to the Austrian Federation of Students -- 1.2 Relevance for the Electoral Committees and Accountability -- 1.3 Structure of the Paper -- 2 Methodology -- 2.1 Deduction of Requirements -- 2.2 Literature Research for Solutions -- 3 Requirements Based on Literature -- 3.1 Legal Requirements at a Glance: The Embedded Case Studies -- 3.2 Requirements for Trust by Electoral Committees -- 3.3 Requirements for Accountability -- 4 Discussion -- Acknowledgements -- References -- The Weakness of Cumulative Voting -- 1 Introduction -- 2 When Should Voters Split Their Votes? -- 3 Voter Utility -- 4 A Continuity Assumption -- 5 Related Voting Systems -- 6 Single Non-transferable Votes -- 7 Alternative Electoral Systems -- 8 Conclusions and Further Work -- References.