E-Voting and Identify: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
In: Lecture Notes in Computer Science Ser. v.7985
Preface -- Organization -- Table of Contents -- Scaling Privacy Guarantees in Code-Verification Elections -- 1 Introduction -- 1.1 Previous Work -- 1.2 Our Results -- 2 Cryptographic Preliminaries and Tools -- 3 The Vote Verification Protocol -- 3.1 Instantiation of the Vote Verification Protocol -- 3.2 Security and Performance -- 3.3 Instantiation of a Code Verification Protocol -- 4 A Visual Vote Verification Protocol -- 4.1 A 2-VSSD Instantiation -- 4.2 Instantiation of the Visual Vote Verification Protocol -- References -- On the Specification and Verification of Voting Schemes -- 1 Introduction -- 2 Semantic Criteria for Analysing Voting Schemes -- 2.1 Basic Criteria -- 2.2 Criteria Characterising the Election Result -- 2.3 Tailor-Made Criteria for Preferential Voting Schemes -- 2.4 Criterion 2: Election Result Consistent with Preferences -- 2.5 Determinism -- 3 Bounded Model Checking for Analysing Voting Schemes -- 4 Case Study: Variants of the Single Transferable Vote Scheme -- 4.1 The Standard Version of STV -- 4.2 The CADE-STV Election Scheme -- 4.3 Effects of the Differences between CADE-STV and Standard STV -- 4.4 Observations on the History of CADE-STV -- 5 Conclusion -- References -- Formal Model-Based Validation for Tally Systems -- 1 Introduction -- 1.1 The Irish Voting Scheme -- 1.2 Proportional Representation by Single Transferable Vote -- 1.3 Votail -- 1.4 Related Work -- 1.5 Outline of Paper -- 2 Formalisation -- 2.1 Mathematical Models -- 2.2 Methodology -- 3 Election Outcomes -- 3.1 Last Two Continuing Candidates -- 3.2 Filling of Last Seat -- 3.3 PR-STV -- 4 Procedure for Automated Test Generation -- 4.1 Generation of Ballot Boxes -- 4.2 Open Source Implementation -- 5 Evaluation and Threats to Validity -- 6 Conclusions -- References -- Vote Casting in Any Preferred Constituency: A New Voting Channel -- 1 Introduction