Breaching the privacy of Israel’s paper ballot voting system

Tomer Ashur, Orr Dunkelman, Nimrod Talmon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

An election is a process through which citizens in liberal democracies select their governing bodies, usually through voting. For elections to be truly honest, people must be able to vote freely without being subject to coercion; that is why voting is usually done in a private manner. In this paper we analyze the security offered by a paper-ballot voting system that is used in Israel, as well as several other countries around the world. We provide an algorithm which, based on publicly-available information, breaks the privacy of the voters participating in such elections. Simulations based on real data collected in Israel show that our algorithm performs well, and can correctly recover the vote of up to 96% of the voters.

Original languageEnglish
Title of host publicationElectronic Voting - 1st International Joint Conference, E-Vote-ID 2016, Proceedings
EditorsVanessa Teague, Melanie Volkamer, Josh Benaloh, P.Y.A. Ryan, Jordi Barrat, Nicole Goodman, Robert Krimmer
PublisherSpringer Verlag
Pages108-124
Number of pages17
ISBN (Print)9783319522395
DOIs
StatePublished - 1 Jan 2017
Externally publishedYes
Event1st International Joint Conference on Electronic Voting, E-Vote-ID 2016 - Bregenz, Austria
Duration: 18 Oct 201621 Oct 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10141 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Joint Conference on Electronic Voting, E-Vote-ID 2016
Country/TerritoryAustria
CityBregenz
Period18/10/1621/10/16

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Breaching the privacy of Israel’s paper ballot voting system'. Together they form a unique fingerprint.

Cite this