Election Security-by-Design

Research output: Conference Article in Proceeding or Book/Report chapterArticle in proceedingsResearchpeer-review

Abstract

Security engineering is about improving the security of an existing software system by adding security controls to the implementation. In this paper we argue, that for election technologies, simply adding security controls is not enough. The only way to design an election system is ensure that it is fundamentally secure by carefully crafting a cryptographic voting protocol, a technique that is also called security-by-design. The more secure a system the more we can trust the result and the more easily we can defend against defamation and disinformation campaigns. Both properties, defense against cyber attacks and defense against disinformation are critical as past elections have demonstrated.
Original languageEnglish
Title of host publicationInnovative Security Solutions for Information Technology and Communications : 17th International Conference, SecITC 2024, Bucharest, Romania, November 21–22, 2024, Revised Selected Papers
Number of pages6
Volume15595
Place of PublicationCham
PublisherSpringer Nature Switzerland
Publication date26 Jul 2025
EditionLNCS
Pages12-17
ISBN (Print)978-3-031-87759-9
ISBN (Electronic)978-3-031-87760-5
DOIs
Publication statusPublished - 26 Jul 2025
EventInternational Conference on Security for Information Technology and Communications - Bucharest, Romania
Duration: 21 Nov 202422 Nov 2024
Conference number: 17
https://secitc.eu/secitc-2024/

Conference

ConferenceInternational Conference on Security for Information Technology and Communications
Number17
Country/TerritoryRomania
CityBucharest
Period21/11/202422/11/2024
Internet address
SeriesLNCS
Volume15595

Keywords

  • e-voting
  • cryptographic voting protocols
  • security-by-design
  • information security
  • disinformation defense

Fingerprint

Dive into the research topics of 'Election Security-by-Design'. Together they form a unique fingerprint.

Cite this