{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:54:03Z","timestamp":1769061243950,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031437557","type":"print"},{"value":"9783031437564","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":264,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Numerous approaches for cast-as-intended verifiability have been proposed in the literature on electronic voting, balancing practical aspects and security guarantees in different ways. One of the well-established methods involves the use of a second device that allows voters to audit their submitted ballots. This approach offers several benefits, including support for flexible ballot and election types and an intuitive user experience. Moreover, solutions based on this approach are generally adaptable to a range of existing voting protocols, rather than being restricted to a particular election scheme. This approach has been successfully implemented in real-life elections, such as in Estonia\u00a0[18].<\/jats:p><jats:p>In this work, we improve the existing solutions for cast-as-intended verifiability based on the use of a second device. We propose a solution that preserves the advantageous practical properties outlined above, while providing stronger security guarantees. Our method does not increase the risk of vote selling compared to the underlying voting protocol to be augmented, and it requires only comparatively weak trust assumptions to achieve this. It can be combined with various voting protocols, including commitment-based systems that provide everlasting privacy.<\/jats:p><jats:p>Overall, our work offers a new option to strengthen cast-as-intended and end-to-end verifiability for real-world Internet elections.<\/jats:p>","DOI":"10.1007\/978-3-031-43756-4_8","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T23:02:23Z","timestamp":1695337343000},"page":"123-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["CAISED: A Protocol for\u00a0Cast-as-Intended Verifiability with\u00a0a\u00a0Second Device"],"prefix":"10.1007","author":[{"given":"Johannes","family":"M\u00fcller","sequence":"first","affiliation":[]},{"given":"Tomasz","family":"Truderung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"8_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association (2008)"},{"key":"8_CR2","first-page":"5","volume":"6","author":"J Benaloh","year":"2006","unstructured":"Benaloh, J.: Simple verifiable elections. EVT 6, 5 (2006)","journal-title":"EVT"},{"key":"8_CR3","unstructured":"Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge, UK (2012)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-68687-5_16","volume-title":"Electronic Voting","author":"A Brelle","year":"2017","unstructured":"Brelle, A., Truderung, T.: Cast-as-intended mechanism with return codes based on PETs. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Sch\u00fcrmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 264\u2013279. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68687-5_16"},{"key":"8_CR5","unstructured":"BSI. Technische Richtlinie TR-03162 (2021). https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr03162\/TR-03162_node.html"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"D Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89\u2013105. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_7"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Cortier, V., Filipiak, A., Lallemand, J.: BeleniosVS: secrecy and verifiability against a corrupted voting device. In: IEEE CSF 2019, pp. 367\u2013381 (2019)","DOI":"10.1109\/CSF.2019.00032"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cortier, V., Galindo, D., K\u00fcsters, R., Mueller, J., Truderung, T.; SoK: verifiability notions for e-voting protocols. In: IEEE S &P 2016, pp. 779\u2013798 (2016)","DOI":"10.1109\/SP.2016.52"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-642-40203-6_27","volume-title":"Computer Security \u2013 ESORICS 2013","author":"\u00c9 Cuvelier","year":"2013","unstructured":"Cuvelier, \u00c9., Pereira, O., Peters, T.: Election verifiability or ballot privacy: do we need to choose? In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 481\u2013498. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_27"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ehin, P., Solvak, M., Willemson, J., Vinkel, P.: Internet voting in Estonia 2005\u20132019: evidence from eleven elections. Gov. Inf. Q. 39(4), 101718 (2022)","DOI":"10.1016\/j.giq.2022.101718"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-22270-7_1","volume-title":"E-Voting and Identity","author":"D Galindo","year":"2015","unstructured":"Galindo, D., Guasch, S., Puiggal\u00ed, J.: 2015 Neuch\u00e2tel\u2019s cast-as-intended verification mechanism. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 3\u201318. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22270-7_1"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Grewal, G.S., Ryan, M.D., Chen, L., Clarkson, M.R.: Du-vote: remote electronic voting with untrusted computers. In: IEEE CSF 2015, pp. 155\u2013169 (2015)","DOI":"10.1109\/CSF.2015.18"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-662-54970-4_8","volume-title":"Financial Cryptography and Data Security","author":"S Guasch","year":"2017","unstructured":"Guasch, S., Morillo, P.: How to challenge and cast your e-vote. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 130\u2013145. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_8"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-52240-1_5","volume-title":"E-Vote-ID 2016","author":"R Haenni","year":"2017","unstructured":"Haenni, R., Koenig, R.E., Dubuis, E.: Cast-as-intended verification in electronic elections based on oblivious transfer. In: Krimmer, R., et al. (eds.) E-Vote-ID 2016. LNCS, vol. 10141, pp. 73\u201391. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52240-1_5"},{"key":"8_CR15","unstructured":"Haenni, R., Koenig, R.E., Locher, P., Dubuis, E.: CHVote system specification. IACR Cryptology ePrint Archive, 2017 (2017)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Haines, T., Lewis, S.J., Pereira, O., Teague, V.: How not to prove your election outcome. In: IEEE S &P 2020, pp. 644\u2013660 (2020)","DOI":"10.1109\/SP40000.2020.00048"},{"key":"8_CR17","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-14303-8_6","volume-title":"Efficient Secure Two-Party Protocols","author":"C Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Sigma protocols and efficient zero-knowledge. In: Hazay, C., Lindell, Y. (eds.) Efficient Secure Two-Party Protocols. ISC, pp. 147\u2013175. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14303-8_6"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Verifiable internet voting in Estonia. In: Krimmer, R., Volkamer, M. (eds.) 6th International Conference on Electronic Voting, EVOTE 2014, Lochau\/Bregenz, Austria, 29\u201331 October 2014, pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Karayumak, F., Kauer, M., Olembo, M.M., Volk, T., Volkamer, M.: User study of the improved Helios voting system interfaces. In: IEEE STAST (2011)","DOI":"10.1109\/STAST.2011.6059254"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Kremer, S., R\u00f8nne, P.B.: To du or not to du: a security analysis of du-vote. In: IEEE EuroS &P 2016, pp. 473\u2013486 (2016)","DOI":"10.1109\/EuroSP.2016.42"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-030-54455-3_21","volume-title":"Financial Cryptography and Data Security","author":"O Kulyk","year":"2020","unstructured":"Kulyk, O., Volkamer, M., M\u00fcller, M., Renaud, K.: Towards improving the efficacy of code-based verification in internet voting. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 291\u2013309. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_21"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., M\u00fcller, J., Scapin, E., Truderung, T.: sElect: a lightweight verifiable remote voting system. In: IEEE CSF 2016, pp. 341\u2013354 (2016)","DOI":"10.1109\/CSF.2016.31"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Clash Attacks on the Verifiability of E-Voting Systems. In: 33rd IEEE Symposium on Security and Privacy (S &P 2012), pp. 395\u2013409. IEEE Computer Society (2012)","DOI":"10.1109\/SP.2012.32"},{"key":"8_CR24","unstructured":"Lindell, Y.: Zero-knowledge from sigma protocols-an erratum (2018). https:\/\/u.cs.biu.ac.il\/~lindell\/errata-zk-sigma.pdf. Accessed 18 Aug 2022"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"M\u00fcller, J., Truderung, T.: A protocol for cast-as-intended verifiability with a second device. arXiv:2304.09456 (2023)","DOI":"10.1007\/978-3-031-43756-4_8"},{"key":"8_CR26","unstructured":"Council of Europe. Council of Europe adopts new Recommendation on Standards for E-Voting (2017). https:\/\/www.coe.int\/en\/web\/electoral-assistance\/-\/council-of-europe-adopts-new-recommendation-on-standards-for-e-voting"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-662-53357-4_12","volume-title":"Financial Cryptography and Data Security","author":"PYA Ryan","year":"2016","unstructured":"Ryan, P.Y.A., R\u00f8nne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-mitigation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 176\u2013192. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_12"},{"key":"8_CR28","unstructured":"Weber, J., Hengartner, U.: Usability study of the open audit voting system Helios. Retrieved August 3, 2012 (2009)"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43756-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T09:21:33Z","timestamp":1703236893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43756-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031437557","9783031437564"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43756-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}