This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Secure online voting could be ready for 2020 or 2025 election

01 May 2015

A new technique could enable people to cast their election vote online - even if their home computers are suspected of being infected with viruses.

Image: Shutterstock

Taking inspiration from the security devices issued by some banks, the security and privacy research group at the University of Birmingham, led by Professor Mark Ryan, has developed a system that allows people to vote by employing independent hardware devices in conjunction with their PCs.

The new technique offers a fresh contribution to the debate surrounding e-voting and could be ready for use in time for the 2020 or 2025 General Election.

"This system works by employing a credit card-sized device similar to those used in online banking," says Professor Ryan. "It is called Du-Vote, and we have been developing it over the past two years. From the voter's perspective, it's straightforward: you receive a code on the device and type it back into the computer.

"The main advantage of this system is that it splits the security between the independent security device and a voter's computer or mobile device. A computer is a hugely powerful, all-purpose machine running billions of lines of code that no one really understands, whereas the independent security device has a much, much smaller code base and is not susceptible to viruses."

Online voting carries a strong security requirement because of the possibility of undetectable interference in an election by foreign governments, criminal gangs, or petty fraudsters. Malware affects an estimated 20 percent to 40 percent of PCs globally, and specific election-targeting malware could be developed to attempt to alter votes cast or compromise ballot secrecy.

Gurchetan Grewal, who is part of the project team at Birmingham, believes this is currently the only piece of work that addresses a core problem of e-voting - namely, that someone may have viruses or other malware on their computer. "For example, the system in Estonia, where they have already introduced online voting, does not deal with this potentially undetectable source of vote manipulation or breach of voter privacy," says Grewal.

The system being developed at Birmingham aims to bypass and detect malware by using a separate security device. But the system achieves even greater security than those used by banks by allowing for the possibility that the security devices themselves have been manufactured under the influence of a hostile adversary.

Paradoxically, the researchers succeed in proving that even if a hostile adversary controls the entire computing infrastructure, voters and election officials can still detect electoral fraud.

The research paper - 'Du-Vote: Remote Electronic Voting with Untrusted Computers' - will be presented at the 28th IEEE Computer Security Foundations Symposium in Verona, Italy, in July.


Print this page | E-mail this page