Desafios e Soluções em Sistemas de Votação Eletrônica: Um Mapeamento Sistemático

  • Jéssica Pegorini UTFPR
  • Natália Yada UTFPR
  • Alinne Souza UTFPR
  • Rodrigo Pagno UTFPR
  • Newton Will UTFPR

Resumo


Resumo. em algumas vantagens, como a rápida apuração dos votos e disponibilidade dos resultados, mas também há problemas tecnológicos a serem tratados para evitar fraudes e falhas no sistema, garantindo um processo íntegro. O presente trabalho apresenta um mapeamento sistemático realizado na área da segurança eleitoral, que busca as principais informações sobre os protocolos utilizados em sistemas de votação eletrônica, as medidas de segurança utilizadas e também as vulnerabilidades e falhas detectadas nesses sistemas. Os resultados apontam uma convergência dos estudos a determinados protocolos e medidas de segurança, além dos principais problemas a serem enfrentados nessa área.

Referências

AboSamra, K. M., AbdelHafez, A. A., Assassa, G. M., and Mursi, M. F. (2017). A practical, secure, and auditable e-voting system. Journal of Information Security and Applications.

Aranha, D. F., Nunes, T., and Cardoso, C. (2018). Execução de código arbitrário na urna eletrônica brasileira. (July):1–36.

Babenko, L. and Pisarev, I. (2018). Cryptographic protocol security verication of the electronic voting system based on blinded intermediaries. In Proc. of the 3rd IITI. Springer.

Babenko, L., Pisarev, I., and Makarevich, O. (2017). A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. In Proc. of the 10th SINCONF. ACM.

Bistarelli, S., Mercanti, I., Santancini, P., and Santini, F. (2019). End-to-end voting with non-permissioned and permissioned ledgers. Journal of Grid Computing.

Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., and Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Systems and Software, 80:571–583.

Chang, D., Chauhan, A. K., Kang, J., et al. (2015). Apollo: End-to-end veriable voting protocol using mixnet and hidden tweaks. In Proc. of the 18th ICISC. Springer.

Cortier, V. and Smyth, B. (2013). Attacking and xing helios: An analysis of ballot secrecy. Journal of Computer Security.

Dossogne, J. and Latte, F. (2015). Blinded additively homomorphic encryption schemes for self-tallying voting. Journal of Information Security and Applications.

Gurubasavanna, M., Shariff, S. U., Mamatha, R., and Sathisha, N. (2018). Multimode authentication In Proc. of the 2nd International Conference on based electronic voting kiosk using raspberry pi. I-SMAC. IEEE.

Haines, T. and Boyen, X. (2016). Truly multi-authority 'prêt-à-voter'. In Proc. of the E-Vote-ID. Springer.

Heiderich, M., Frosch, T., Niemietz, M., and Schwenk, J. (2011). The bug that made me president a browser-and web-security case study on helios voting. In Proc. of the 3rd Vote-ID. Springer.

Hsiao, T.-C., Wu, Z.-Y., Liu, C.-H., and Chung, Y.-F. (2017). Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme. Advances in Mechanical Engineering.

Huarte, M., Goirizelaia, I., Unzilla, J. J., Matías, J., and Igarza, J. J. (2013). A new fully auditable proposal for an internet voting system with secure individual verication and complaining capabilities. In Proc. of the 10th SECRYPT. IEEE.

Hussien, H. and Aboelnaga, H. (2013). Design of a secured e-voting system. In Proc. of the ICCAT. IEEE.

Institute for Democracy and Electoral Assistance (2015). Use of e-voting around the world. https: //www.idea.int/news-media/media/use-e-voting-around-world. Acessado em: 08/07/2019.

Jin, C., Chen, G., Yu, C., Zhao, J., Jin, Y., and Shan, J. (2019). Heterogeneous deniable authentication and its application to e-voting systems. Journal of Information Security and Applications.

Kartit, Z., El Marraki, M., Azougaghe, A., and Belkasmi, M. (2015). Towards a secure electronic voting in cloud computing environment using homomorphic encryption algorithm. International Journal of Applied Engineering Research.

Kate, N. and Katti, J. (2016). Security of remote voting system based on visual cryptography and sha. In Proc. of the ICCUBEA. IEEE.

Kheli, A., Grisi, Y., Sou, D., Mohanad, D., and Shastry, P. (2013). M-vote: a reliable and highly secure mobile voting system. In Proc. of the PICICT. IEEE.

Kiayias, A., Zacharias, T., and Zhang, B. (2015). On the necessity of auditing for election privacy in e-voting systems. In Proc. of the e-Democracy. Springer.

Kiayias, A., Zacharias, T., and Zhang, B. (2017). Auditing for privacy in threshold pke e-voting. Information & Computer Security.

Kim, C. S., Jung, C. D., Ha, S. Y., and Park, C. H. (2013). A study on the ubiquitous e-voting system for the implementation of e-government. International Journal of Security & Its Applications.

Kitchenham, B., Pretorius, R., Budgen, D., Brereton, O. P., Turner, M., Niazi, M., and Linkman, S. (2010). Systematic literature reviews in software engineering–a tertiary study. Information and Software Technology.

Kumar, M., Katti, C. P., and Saxena, P. C. (2017). A secure anonymous e-voting system using identitybased blind signature scheme. In Proc. of the ICISSP. Springer.

Lakshmi, C. J. and Kalpana, S. (2018). Secured and transparent voting system using biometrics. In Proc. of the 2nd ICISC. IEEE.

Lavanya, S. (2011). Trusted secure electronic voting machine. In Proc. of the ICONSET. IEEE.

Lee, K., Lee, Y., Won, D., and Kim, S. (2010). Protection prole for secure e-voting systems. In Proc. of the 6th ISPEC. Springer.

Mohammadpourfard, M., Doostari, M. A., Ghaznavi Ghoushchi, M. B., and Shakiba, N. (2015). A new secure internet voting protocol using java card 3 technology and java information ow concept. Security and Communication Networks.

Nassar, M., Malluhi, Q., and Khan, T. (2018). A scheme for three-way secure and veriable e-voting. In Proc. of the 15th AICCSA. IEEE.

Nguyen, T. A. T. and Dang, T. K. (2013a). Enhanced security in internet voting protocol using blind signature and dynamic ballots. Electronic Commerce Research.

Nguyen, T. A. T. and Dang, T. K. (2013b). A practical solution against corrupted parties and coercers in electronic voting protocol over the network. In Proc. of the ICT-EurAsia. Springer.

Olembo, M. M., Schmidt, P., and Volkamer, M. (2011). Introducing veriability in the polyas remote electronic voting system. In Proc. of the 6th ARES. IEEE.

Peng, K. (2011). A general and efcient countermeasure to relation attacks in mix-based e-voting. International Journal of Information Security.

Pereira, O. and Wallach, D. S. (2017). Clash attacks and the star-vote system. In Proc. of the E-Vote-ID. Springer.

Rura, L., Issac, B., and Haldar, M. (2015). Vulnerability studies of e2e voting systems. In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Springer.

Saqib, M. N., Kiani, J., Shahzad, B., Anjum, A., Ahmad, N., et al. (2018). Anonymous and formally veried dual signature based online e-voting protocol. Cluster Computing.

Sebé, F., Miret, J. M., Pujolàs, J., and Puiggalí, J. (2010). Simple and efcient hash-based veriable mixing for remote electronic voting. Computer Communications.

Shakiba, N. M., Doostari, M.-A., and Mohammadpourfard, M. (2017). Esiv: an end-to-end secure internet voting system. Electronic Commerce Research.

Smartmatic (2018). Benefícios do voto eletrônico. http://www.smartmatic.com/pt/ votacao/voto-eletronico/. Acessado em: 14/10/2018.

Spycher, O. and Haenni, R. (2010). A novel protocol to allow revocation of votes a hybrid voting system. In Proc. of the ISSA. IEEE.

Srinivasan, S., Culnane, C., Heather, J., Schneider, S., and Xia, Z. (2013). Countering ballot stufng and incorporating eligibility veriability in helios. In Proc. of the NSS. Springer.

Tornos, J. L., Salazar, J. L., and Piles, J. J. (2015). Optimizing ring signature keys for e-voting. In Proc. of the IWCMC. IEEE.

Will, M. A., Nicholson, B., Tiehuis, M., and Ko, R. K. (2015). Secure voting in the cloud using homomorphic encryption and mobile agents. In Proc. of the ICCCRI. IEEE.

Yoon, E.-J., Yoo, K.-Y., Yeo, S.-S., and Lee, C. (2010). Robust deniable authentication protocol. Wireless Personal Communications.

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P., and Au, M. H. (2018). Platformindependent secure blockchain-based voting system. In Proc. of the ISC. Springer.

Zhang, H., You, Q., and Zhang, J. (2015). A lightweight electronic voting scheme based on blind signature and kerberos mechanism. In Proc. of the 5th ICEIEC. IEEE.

Zhou, Y., Zhou, Y., Chen, S., and Wu, S. S. (2016). Mvp: an efcient anonymous e-voting protocol. In Proc. of the GLOBECOM. IEEE.

Zhu, Y., Zeng, Z., and Lv, C. (2018). Anonymous voting scheme for boardroom with blockchain. International Journal of Performability Engineering.

Zissis, D. and Lekkas, D. (2011). Securing e-government and e-voting with an open cloud computing architecture. Government Information Quarterly.
Publicado
02/09/2019
PEGORINI, Jéssica; YADA, Natália; SOUZA, Alinne; PAGNO, Rodrigo; WILL, Newton. Desafios e Soluções em Sistemas de Votação Eletrônica: Um Mapeamento Sistemático. In: WORKSHOP DE TECNOLOGIA ELEITORAL, 4. , 2019, São Paulo. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 13-24. DOI: https://doi.org/10.5753/wte.2019.14040.