TY - GEN
T1 - Towards improving the efficacy of code-based verification in internet voting
AU - Kulyk, Oksana
AU - Volkamer, Melanie
AU - Müller, Monika
AU - Renaud, Karen
PY - 2020
Y1 - 2020
N2 - End-to-end verifiable Internet voting enables a high level of election integrity. Cast-as-intended verification, in particular, allows voters to verify that their vote has been correctly cast, even in the presence of malicious voting devices. One cast-as-intended verification approach is code-based verification, used since 2015 in legally-binding Swiss elections. We evaluated the Swiss paper-based polling sheet and voting interface, focusing on how well it supported voters in verifying their votes. We uncovered several potential issues related to manipulation detection. We improved the paper-based polling sheet and voting interface accordingly. Then, we carried out a between-subjects lab study with 128 participants to compare the original and improved sheet and interface wrt. usability and its effectiveness in supporting manipulation detection. Our improvements significantly enhanced detection. Our study delivered insights into participants’ somewhat ineffectual reactions to detected anomalies, i.e. starting over again and trying to cast the same vote again, or calling the telephone number provided by the interface. This problem is likely to manifest in any verifiable voting system and thus needs to be addressed as future work.
AB - End-to-end verifiable Internet voting enables a high level of election integrity. Cast-as-intended verification, in particular, allows voters to verify that their vote has been correctly cast, even in the presence of malicious voting devices. One cast-as-intended verification approach is code-based verification, used since 2015 in legally-binding Swiss elections. We evaluated the Swiss paper-based polling sheet and voting interface, focusing on how well it supported voters in verifying their votes. We uncovered several potential issues related to manipulation detection. We improved the paper-based polling sheet and voting interface accordingly. Then, we carried out a between-subjects lab study with 128 participants to compare the original and improved sheet and interface wrt. usability and its effectiveness in supporting manipulation detection. Our improvements significantly enhanced detection. Our study delivered insights into participants’ somewhat ineffectual reactions to detected anomalies, i.e. starting over again and trying to cast the same vote again, or calling the telephone number provided by the interface. This problem is likely to manifest in any verifiable voting system and thus needs to be addressed as future work.
KW - electronic voting
KW - verifiability
KW - internet voting
KW - usability
UR - https://link.springer.com/chapter/10.1007/978-3-030-54455-3_21
U2 - 10.1007/978-3-030-54455-3_21
DO - 10.1007/978-3-030-54455-3_21
M3 - Article in proceedings
T3 - Lecture Notes in Computer Science
SP - 291
EP - 309
BT - International Conference on Financial Cryptography and Data Security
PB - Springer
T2 - Financial Cryptography and Data Security Workshop on Advances in Secure Electronic Voting (VOTING)
Y2 - 14 February 2020 through 14 February 2020
ER -