Attacking Paper-Based E2E Voting Systems

被引:0
|
作者
Kelsey, John [1 ]
Regenscheid, Andrew [1 ]
Moran, Tal [2 ]
Chaum, David
机构
[1] NIST, Gaithersburg, MD USA
[2] Harvard SEAS, Inst Sci, Cambridge, MA 02138 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Pret-a-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.
引用
收藏
页码:370 / +
页数:3
相关论文
共 50 条
  • [11] E2E Verifiable Borda Count Voting System without Tallying Authorities
    Bag, Samiran
    Azad, Muhammad Ajmal
    Hao, Feng
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [12] Entropy-Based Dynamic Rescoring with Language Model in E2E ASR Systems
    Gong, Zhuo
    Saito, Daisuke
    Minematsu, Nobuaki
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [13] On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial
    Druliac, Horia
    Bardsley, Matthew
    Riches, Chris
    Dunn, Christian
    Harrison, Luke
    Roy, Bimal
    Hao, Feng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81
  • [14] Towards Environment-to-Environment (E2E) multimedia communication systems
    Vivek K. Singh
    Hamed Pirsiavash
    Ish Rishabh
    Ramesh Jain
    [J]. Multimedia Tools and Applications, 2009, 44 : 361 - 388
  • [15] On Persistent Implications of E2E Testing
    Frajtak, Karel
    Cerny, Tomas
    [J]. ENTERPRISE INFORMATION SYSTEMS, ICEIS 2021, 2022, 455 : 326 - 338
  • [16] Towards Environment-to-Environment (E2E) multimedia communication systems
    Singh, Vivek K.
    Pirsiavash, Hamed
    Rishabh, Ish
    Jain, Ramesh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2009, 44 (03) : 361 - 388
  • [17] E2E数据采集网络
    张振华
    宫海波
    李国星
    [J]. 中国科技信息, 2017, (06) : 67 - 70
  • [18] A LIKELIHOOD RATIO BASED DOMAIN ADAPTATION METHOD FOR E2E MODELS
    Choudhury, Chhavi
    Gandhe, Ankur
    Ding, Xiaohan
    Bulyko, Ivan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 6762 - 6766
  • [19] Cooperative AI-based e2e Network Slice Scaling
    Bouzid, Makram
    Duc Hung Luong
    Kostadinov, Dimitre
    Jin, Yue
    Maggi, Lorenzo
    Outtagarts, Abdelkader
    Aghasaryan, Armen
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 959 - 960
  • [20] POSTER: An E2E Trusted Cloud Infrastructure
    Wang, Juan
    Zhao, Bo
    Zhang, Huanguo
    Yan, Fei
    Zhang, Liqiang
    Yu, Fajiang
    Hu, Hongxin
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1517 - 1519