usenix conference policies
Keynote Address Security of Voting Systems
While running an election sounds simple, it is in fact extremely challenging. Not only are there millions of voters to be authenticated and millions of votes to be carefully collected, counted, and stored, there are now millions of "voting machines" containing millions of lines of code to be evaluated for security vulnerabilities. Moreover, voting systems have a unique requirement: the voter must not be given a "receipt" that would allow them to prove how they voted to someone else—otherwise the voter could be coerced or bribed into voting a certain way. This lack of receipts makes the security of voting system much more challenging than, say, the security of banking systems (where receipts are the norm).
We discuss some of the recent trends and innovations in voting
systems, as well as some of the new requirements being placed
upon voting systems in the U.S., and describe some promising
directions for resolving the conflicts inherent in voting
system requirements, including some approaches based on
cryptography. We'll also briefly discuss "Internet voting."
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Ronald L. Rivest},
title = {Keynote Address Security of Voting Systems},
booktitle = {4th USENIX Symposium on Networked Systems Design \& Implementation (NSDI 07)},
year = {2007},
address = {Cambridge, MA},
url = {https://www.usenix.org/conference/nsdi-07/keynote-address-security-voting-systems},
publisher = {USENIX Association},
month = apr
}
connect with us