Access the full text.
Sign up today, get DeepDyve free for 14 days.
Anfu Zhou, Guangyuan Su, Shilin Zhu, Huadong Ma (2019)
Invisible QR Code Hijacking Using Smart LEDProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3
Virginia Braun, Victoria Clarke
Please Scroll down for Article Qualitative Research in Psychology Using Thematic Analysis in Psychology
(2010)
The Helios E-Voting Demo for the IACR. International Association for Cryptologic Research
(2015)
An overview of the iVote 2015 voting system
D. Galindo, Sandra Guasch, J. Puiggalí (2015)
2015 Neuchâtel's Cast-as-Intended Verification Mechanism
Estonian National Electoral Committee (2015)
Statistics about Internet Voting in EstoniaRetrieved November 28, 2019 from https://www.valimised.ee/en/archive/statistics-about-internet-voting-estonia. , 28
Radhesh Konoth, V. Veen, H. Bos (2016)
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication
Y. Nasser, C. Okoye, Jeremy Clark, P. Ryan (2018)
Blockchains and Voting: Somewhere between hype and a panacea (A Position Paper)
V. Cortier, Alicia Filipiak, Joseph Lallemand (2019)
BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device2019 IEEE 32nd Computer Security Foundations Symposium (CSF)
C. Acemyan, P. Kortum, M. Byrne, D. Wallach (2014)
Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II
A. Kiayias, T. Zacharias, Bingsheng Zhang (2017)
An Efficient E2E Verifiable E-voting System without Setup AssumptionsIEEE Security & Privacy, 15
A. Brelle, Tomasz Truderung (2017)
Cast-as-Intended Mechanism with Return Codes Based on PETs
Kazue Sako, J. Kilian (1995)
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth
R. Haenni, Reto Koenig, E. Dubuis (2016)
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer
NSW Electoral Commission (2019)
iVote Online and Telephone VotingRetrieved November 18, 2019 from https://www.elections.nsw.gov.au/Voters/Other-voting-options/iVote-online-and-telephone-voting. , 18
Josh Benaloh (2006)
Simple Verifiable Elections
G. Tsoukalas, Kostas Papadimitriou, Panos Louridas, P. Tsanakas (2013)
From Helios to Zeus, 1
Laurent Grégoire (2012)
Comment mon ordinateur a vote à ma place (2012)Retrieved from https://www.lesinrocks.com/actu/comment-mon-ordinateur-vote-ma-place-344254-29-05-2012/.
(2020)
Ordinos: A verifiable tallyhiding e-voting system
Alex Escala, Sandra Guasch, Javier Herranz, Paz Morillo (2016)
Universal Cast-as-Intended Verifiability
Emiliano De Cristofaro, Honglu Du, Julien Freudiger, Greg Norcie (2014)
A comparative usability study of two-factor authenticationProceedings of the Workshop on Usable Security. Internet Society
Jörg Helbach, Jörg Schwenk (2007)
Secure Internet Voting with Code Sheets
Shahram Khazaei, Douglas Wikström (2017)
Return Code Schemes for Electronic Voting Systems
Virginia Braun, Victoria Clarke (2006)
Using thematic analysis in psychologyQualitative Research in Psychology, 3
Marie-Laure Zollinger, Verena Distler, P. Rønne, P. Ryan, Carine Lallemand, Vincent Koenig (2019)
User Experience Design for E-Voting: How mental models align with security mechanismsArXiv, abs/2105.14901
Josh Benaloh (2007)
Ballot Casting Assurance via Voter-Initiated Poll Station Auditing
V. Cortier, D. Galindo, Ralf Küsters, Johannes Müller, Tomasz Truderung (2016)
SoK: Verifiability Notions for E-Voting Protocols2016 IEEE Symposium on Security and Privacy (SP)
B. Adida (2006)
Advances in Cryptographic Voting SystemsPh.D. Dissertation. Massachusetts Institute of Technology
International Organization for Standardization (2010)
ISO 9241-210: Ergonomics of Human System Interaction - Part 210: Human-Centred Design for Interactive SystemsISO 9241-210: Ergonomics of Human System Interaction - Part 210: Human-Centred Design for Interactive Systems.ISO
Fatih Karayumak, M. Olembo, M. Kauer, M. Volkamer (2011)
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Sandra Guasch, Paz Morillo (2016)
How to Challenge and Cast Your e-Vote
J. Halderman, Vanessa Teague (2015)
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
Ted Selker, Elizabeth Rosenzweig, Anna Pandolfo (2006)
A methodology for testing voting systemsJournal of Usability Studies 2, 1 (Nov. 2006), 7–21. Retrieved from, 2
C. Culnane, Vanessa Teague (2016)
Strategies for Voter-Initiated Election Audits
P. Ryan, Vanessa Teague (2009)
Pretty Good Democracy
J. Brocke, Alexander Simons, Björn Niehaves, K. Riemer, Ralf Plattfaut, A. Cleven (2009)
Reconstructing the giant: On the importance of rigour in documenting the literature search process
(2015)
ICTs in Elections Database
Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung (2016)
sElect: A Lightweight Verifiable Remote Voting System2016 IEEE 29th Computer Security Foundations Symposium (CSF)
Karola Marky, Marie-Laure Zollinger, Markus Funk, P. Ryan, M. Mühlhäuser (2019)
How to Assess the Usability Metrics of E-Voting Schemes
Programme Office eGovernment Switzerland (2019)
Electronic VotingRetrieved November 18, 2019 from https://www.egovernment.ch/en/umsetzung/schwerpunktplan/vote-electronique/. , 18
Pyrros Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo (2016)
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting SchemeProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Halderman (2012)
Attacking the Washington, D.C. Internet Voting System
J. Webster, R. Watson (2002)
Analyzing the Past to Prepare for the Future: Writing a Literature ReviewMIS Q., 26
J. Brooke (1996)
SUS: A 'Quick and Dirty' Usability Scale
Jurlind Budurushi, Melanie Volkamer, Oksana Kulyk, Stephan Neumann (2017)
Nothing comes for free: How much usability can you sacrifice for security?IEEE Security & Privacy Special Issue on Electronic Voting 15, 3(2017), 24–29DOI:DOI:https://doi.org/10.1109/MSP.2017.265093646
Yomna Nasser, Chidinma Okoye, Jeremy Clark, Peter Y.A. Ryan (2018)
Blockchains and Voting: Somewhere Between Hype and a PanaceaRetrieved from http://users.encs.concordia.ca/ clark/papers/draft_voting.pdf.
Karola Marky, O. Kulyk, M. Volkamer (2018)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
D. Balzarotti, Greg Banks, M. Cova, Viktoria Felmetsger, R. Kemmerer, William Robertson, Fredrik Valeur, G. Vigna (2010)
An Experience in Testing the Security of Real-World Electronic Voting SystemsIEEE Transactions on Software Engineering, 36
Ed Gerck, C. Neff, R. Rivest, A. Rubin, M. Yung (2002)
The Business of Electronic Voting
D. Balzarotti, Greg Banks, M. Cova, Viktoria Felmetsger, R. Kemmerer, William Robertson, Fredrik Valeur, G. Vigna (2008)
Are your votes really counted?: testing the security of real-world electronic voting systems
AV-Test The Independent IT-Security Institute (2020)
MalwareRetrieved May 31, 2020 from https://www.av-test.org/en/statistics/malware/., 31
(2012)
Comment mon ordinateur a vote à ma place
Verena Distler, Marie-Laure Zollinger, Carine Lallemand, P. Rønne, P. Ryan, Vincent Koenig (2019)
Security - Visible, Yet Unseen?Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
Kristian Gjøsteen (2011)
The Norwegian Internet Voting ProtocolIACR Cryptol. ePrint Arch., 2013
Estonian National Electoral Committee
Joshua Tan, Lujo Bauer, Joseph Bonneau, L. Cranor, Jeremy Thomas, Blase Ur (2017)
Can Unicorns Help Users Compare Crypto Key Fingerprints?Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
M. Olembo, Steffen Bartsch, M. Volkamer (2013)
Mental Models of Verifiability in Voting
Sergej Dechand, Dominik Schürmann, Karoline Busse, Y. Acar, S. Fahl, Matthew Smith (2016)
An Empirical Study of Textual Key-Fingerprint Representations
Janna-Lynn Weber (2009)
Usability Study of the Open Audit Voting System Helios
Hua Wu, P. Vora, Filip Zagórski (2019)
PrivApollo – Secret Ballot E 2 EV Internet Voting
S. Kremer, P. Rønne (2016)
To Du or Not to Du: A Security Analysis of Du-Vote2016 IEEE European Symposium on Security and Privacy (EuroS&P)
W. Wagenaar (1972)
Generation of random sequences by human subjects: A critical survey of literature.Psychological Bulletin, 77
Peter Kieseberg, Manuel Leithner, M. Mulazzani, Lindsay Munroe, S. Schrittwieser, Mayank Sinha, E. Weippl (2010)
QR code security
Programme Office eGovernment Switzerland
Kat Krol, E. Philippou, Emiliano Cristofaro, M. Sasse (2015)
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online BankingArXiv, abs/1501.04434
Karola Marky, O. Kulyk, K. Renaud, M. Volkamer (2018)
What Did I Really Vote For? On the Usability of Verifiable E-Voting SchemesProceedings of the 2018 CHI Conference on Human Factors in Computing Systems
Bettina Laugwitz, Theo Held, Martin Schrepp (2008)
Construction and Evaluation of a User Experience Questionnaire
O. Kulyk, Stephan Neumann, Jurlind Budurushi, M. Volkamer (2017)
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?IEEE Security & Privacy, 15
Drew Springall, Travis Finkenauer, Z. Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Halderman (2014)
Security Analysis of the Estonian Internet Voting SystemProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Josh Benaloh, P. Ryan, Vanessa Teague (2013)
Verifiable Postal Voting
(2001)
Surevote: Technical overview
S. Heiberg, J. Willemson (2014)
Verifiable internet voting in Estonia2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE)
R. Krimmer, David Duenas-Cid, Iuliia Krivonosova, Priit Vinkel, Arne Koitmae (2018)
How Much Does an e-Vote Cost? Cost Comparison per Vote in Multichannel Elections in Estonia
Filip Zagórski, R. Carback, D. Chaum, Jeremy Clark, A. Essex, P. Vora (2013)
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Estonian National Electoral Committee (2010)
E-Voting System General OverviewRetrieved March 28, 2019 from http://www.vvk.ee/public/dok/General_Description_E-Voting_2010.pdf., 28
Sergiu Bursuc, Gurchetan Grewal, M. Ryan (2011)
Trivitas: Voters Directly Verifying Votes
O. Kulyk, J. Henzel, K. Renaud, M. Volkamer (2019)
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations
Jane Webster, Richard T. Watson (2002)
Analyzing the past to prepare for the future: Writing a literature reviewManagement Information Systems Quarterly, 26
Steve Kremer, Peter B. Rønne (2016)
To du or not to du: A security analysis of du-voteProceedings of the IEEE European Symposium on Security and Privacy. IEEE
Víctor Mateu, M. Valls (2017)
Cast as Intended Verifiability for Mixed Array Ballots
Gurchetan Grewal, M. Ryan, Liqun Chen, Michael Clarkson (2015)
Du-Vote: Remote Electronic Voting with Untrusted Computers2015 IEEE 28th Computer Security Foundations Symposium
Uwe Flick (2018)
An introduction to qualitative researchSage Publications Limited.
Dawid Gawel, Maciej Kosarzecki, P. Vora, Hua Wu, Filip Zagórski (2016)
Apollo - End-to-End Verifiable Internet Voting with Recovery from Vote Manipulation
Stephan Neumann, M. Olembo, K. Renaud, M. Volkamer (2014)
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Olivier Marneffe, Olivier Pereira, J. Quisquater (2009)
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios
B. Adida (2008)
Helios: Web-based Open-Audit Voting
Acemyan Claudia Z. (2014)
26The USENIX Journal of Election Technology and Systems, 2
V. Cortier, G. Fuchsbauer, D. Galindo (2015)
BeleniosRF: A Strongly Receipt-Free Electronic Voting SchemeIACR Cryptol. ePrint Arch., 2015
(1998)
ISO 9241-11: Ergonomics of Human System Interaction Part 11: Guidance on Usability
Stuart Haber, Josh Benaloh, Shai Halevi (2010)
The Helios E-Voting Demo for the IACRInternational Association for Cryptologic Research
Nikos Chondros, Bingsheng Zhang, T. Zacharias, P. Diamantopoulos, Stathis Maneas, Christos Patsonakis, A. Delis, A. Kiayias, M. Roussopoulos (2015)
D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)
Jordi Puigalli, Sandra Guasch (2012)
Cast-as-Intended Verification in Norway
P. Ryan, P. Rønne, Vincenzo Iovino (2016)
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
Ian Alexander (2000)
An introduction to qualitative researchEuropean Journal of Information Systems, 9
P. Ryan, D. Bismark, J. Heather, Steve Schneider, Zhe Xia (2009)
PrÊt À Voter: a Voter-Verifiable Voting SystemIEEE Transactions on Information Forensics and Security, 4
A. Kiayias, T. Zacharias, Bingsheng Zhang (2015)
End-to-End Verifiable Elections in the Standard ModelIACR Cryptol. ePrint Arch., 2015
J. Puiggalí, Sandra Guasch (2011)
Internet Voting System with Cast as Intended Verification
Arne Ansper, S. Heiberg, H. Lipmaa, Tom Øverland, F. Laenen (2009)
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011
Overview of Polyas Costumers
Ivo Kubjas, Tiit Pikma, J. Willemson (2017)
Estonian Voting Verification Mechanism Revisited AgainIACR Cryptol. ePrint Arch., 2017
A. Kiayias, T. Zacharias, B. Zhang (2017)
An efficient E2E verifiable E-voting system without setup assumptionsIEEE Security Privacy, 15
K. Fuglerud, Till Røssvoll (2012)
An evaluation of web-based voting usability and accessibilityUniversal Access in the Information Society, 11
Vincenzo Iovino, A. Rial, P. Rønne, P. Ryan (2017)
Using Selene to Verify Your Vote in JCJ
Karola Marky, Verena Zimmermann, Markus Funk, Jörg Daubert, Kira Bleck, M. Mühlhäuser (2020)
Improving the Usability and UX of the Swiss Internet Voting InterfaceProceedings of the 2020 CHI Conference on Human Factors in Computing Systems
T. Selker, Elizabeth Rosenzweig, Anna Pandolfo (2006)
A methodology for testing voting systemsJournal of Usability Studies archive, 2
Jacob Cohen (1960)
A Coefficient of Agreement for Nominal ScalesEducational and Psychological Measurement, 20
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning voting infrastructure. Individual verifiability aims to protect against such risks by letting voters verify that their votes are correctly registered in the electronic ballot box. Therefore, voters need to carry out additional tasks making human factors crucial for security. In this article, we establish a categorization of individually verifiable Internet voting schemes based on voter interactions. For each category in our proposed categorization, we evaluate a voting scheme in a user study with a total of 100 participants. In our study, we assessed usability, user experience, trust, and further qualitative data to gain deeper insights into voting schemes. Based on our results, we conclude with recommendations for developers and policymakers to inform the choices and design of individually verifiable Internet voting schemes.
ACM Transactions on Computer-Human Interaction (TOCHI) – Association for Computing Machinery
Published: Sep 4, 2021
Keywords: E-Voting
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.