CFP last date
15 May 2024
Call for Paper
June Edition
IJAIS solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 15 May 2024

Submit your paper
Know more
Reseach Article

Comparison of e-Voting Schemes: Estonian and Norwegian Solutions

by Mohammad Jabed Morshed Chowdhury
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 2
Year of Publication: 2013
Authors: Mohammad Jabed Morshed Chowdhury
10.5120/ijais13-451020

Mohammad Jabed Morshed Chowdhury . Comparison of e-Voting Schemes: Estonian and Norwegian Solutions. International Journal of Applied Information Systems. 6, 2 ( September 2013), 60-66. DOI=10.5120/ijais13-451020

@article{ 10.5120/ijais13-451020,
author = { Mohammad Jabed Morshed Chowdhury },
title = { Comparison of e-Voting Schemes: Estonian and Norwegian Solutions },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2013 },
volume = { 6 },
number = { 2 },
month = { September },
year = { 2013 },
issn = { 2249-0868 },
pages = { 60-66 },
numpages = {9},
url = { https://www.ijais.org/archives/volume6/number2/530-1020/ },
doi = { 10.5120/ijais13-451020 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:52:18.005454+05:30
%A Mohammad Jabed Morshed Chowdhury
%T Comparison of e-Voting Schemes: Estonian and Norwegian Solutions
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 6
%N 2
%P 60-66
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An increasing number of elections have been performed using Online Voting including Estonia, Canada, Norway and Switzerland. In October 2005, Estonia organized countrywide remote e-voting. Every Estonian citizen got the opportunity to cast their vote via Internet from all over the world. Approximately 2% of actual voters made use of this opportunity. Different countries are also working on to develop their own e-voting system. Inspired by the recent development, Norwegian government has also decided to develop e-voting system in the country. Norway’s internet voting pilot project held in 2011 and countrywide e-voting will be held in 2017. Due to these experiences, the technical research topics have changed: While voting protocols have been well analyzed in the past, but little research has been done on the performed system. This paper will investigate the security and trustworthiness of the performed online voting. For this paper study and examine Estonian and Norwegian online voting system.

References
  1. Internet voting in Estonia: www.vvk.ee/public/dok/Internet Voting in Estonia.pdf
  2. Working Committee: E-Voting System. www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf(2005)
  3. AS Sertifitseerimiskeskus: DigiDocService spetsifikatsioon. http://www.sk.ee/files/DigiDocService spec 2 123 est.pdf (01.03.2009)
  4. Arne Ansper, Ahto Buldas, Mart Oruaas, Jaan Priisalu, Anto Veldre, Jan Willem-son and Kaur Virunurm: E-voting conception security: analysis and measures. http://www.vvk.ee/public/dok/e-voting-security.pdf (15.12.2003).
  5. Kristian Gjosteen: Analysis of an internet voting protocol. http://www.regjeringen.no/upload/KRD/Kampanjer/valgportal/e valg/Nyheter/core.pdf (March 9, 2010)
  6. Working Committee: Electronic voting challenges and opportunities. Ministry of Local Government and Regional Development, Norway (2006)
  7. Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom Andre Overland, and Filip van Laenen: Security and Trust for the Norwegian E-voting Pilot Project E-valg 2011. NordSec ’09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age (2009 )
  8. Working Committee: e-Vote 2011 Security Objectives. Ministry of Local Govern-ment and Regional Development, Norway (2009)
  9. Stuxnet attack: http://www.zdnet.co.uk/news/security-threats/2010/09/26/iran-confirms-stuxnet-attack-on-nuclear-site-40090272/ (last access time 7nd Decem-ber)
  10. Collin Mulliner and Charlie Miller: Injecting SMS Messages into Smart Phones for Security Analysis. WOOT’09 Proceedings of the 3rd USENIX conference on O?ensive technologies, (2009 )
  11. Black Hat: SMS Attacks: http://www.tipb.com/2009/07/30/black-hat-sms-attacks-iphones (last access time 2nd December).
Index Terms

Computer Science
Information Sciences

Keywords

e-voting security SMS attack