{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:07:49Z","timestamp":1757628469764,"version":"3.44.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032050359","type":"print"},{"value":"9783032050366","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>This paper takes a critical look at the recommendations OSCE\/ODIHR has given for the Estonian Internet voting over the\u00a020 years it has been running. We present examples of recommendations that can not be fulfilled at all, but also examples where fulfilling a recommendation requires a non-trivial trade-off, potentially weakening the system in some other respect. In such cases OSCE\/ODIHR should take an explicit position which trade-off it recommends.\u00a0We also look at the development of the recommendation to introduce end-to-end verifiability. In this case we expect OSCE\/ODIHR\u00a0to define what it exactly means by this property, as well as to\u00a0give explicit criteria to determine whether and to which extent end-to-end verifiability has been achieved.<\/jats:p>","DOI":"10.1007\/978-3-032-05036-6_13","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:18Z","timestamp":1757488938000},"page":"208-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Recommendations to\u00a0OSCE\/ODIHR (on How to\u00a0Give Better Recommendations for\u00a0Internet Voting)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-2099","authenticated-orcid":false,"given":"Jan","family":"Willemson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"13_CR1","unstructured":"Estonia, Parliamentary Elections, 4 March 2007: Final Report. Tech. rep., OSCE\/ODIHR (2007). https:\/\/www.osce.org\/odihr\/elections\/estonia\/25925"},{"key":"13_CR2","unstructured":"Estonia, Parliamentary Elections, 6 March 2011: Final Report. Tech. rep., OSCE\/ODIHR (2011). https:\/\/www.osce.org\/odihr\/77557"},{"key":"13_CR3","unstructured":"Estonia, Parliamentary Elections, 1 March 2015: Final Report. Tech. rep., OSCE\/ODIHR (2015). https:\/\/www.osce.org\/odihr\/elections\/estonia\/160131"},{"key":"13_CR4","unstructured":"Estonia, Parliamentary Elections, 3 March 2019: Final Report. Tech. rep., OSCE\/ODIHR (2019). https:\/\/www.osce.org\/odihr\/elections\/estonia\/424229"},{"key":"13_CR5","unstructured":"Estonia, Parliamentary Elections, 5 March 2023: Final Report. Tech. rep., OSCE\/ODIHR (2023). https:\/\/www.osce.org\/odihr\/elections\/estonia\/551179"},{"key":"13_CR6","unstructured":"Handbook for the Observation of Information and Communication Technologies (ICT) in Elections. OSCE\/ODIHR (2024). https:\/\/www.osce.org\/odihr\/elections\/558318"},{"key":"13_CR7","unstructured":"Benaloh, J.: Rethinking voter coercion: the realities imposed by technology. In: 2013 Electronic Voting Technology Workshop \/ Workshop on Trustworthy Elections, EVT\/WOTE \u201913, Washington, D.C., USA, August 12-13, 2013. USENIX Association (2013). https:\/\/www.usenix.org\/conference\/evtwote13\/workshop-program\/presentation\/benaloh"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Benaloh, J.C., Yung, M.: Distributing the power of a government to enhance the privacy of voters (extended abstract). In: Halpern, J.Y. (ed.) Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, Calgary, Alberta, Canada, August 11-13, 1986pp. 52\u201362. ACM (1986). https:\/\/doi.org\/10.1145\/10590.10595","DOI":"10.1145\/10590.10595"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/10361140500507278","volume":"41","author":"P Brent","year":"2006","unstructured":"Brent, P.: The Australian ballot: not the secret ballot. Aust. J. Polit. Sci. 41(1), 39\u201350 (2006). https:\/\/doi.org\/10.1080\/10361140500507278","journal-title":"Aust. J. Polit. Sci."},{"key":"13_CR10","unstructured":"Calandrino, J.A., Clarkson, W.: Some consequences of paper fingerprinting for elections. In: Jefferson, D., Hall, J.L., Moran, T. (eds.) 2009 Electronic Voting Technology Workshop \/ Workshop on Trustworthy Elections, EVT\/WOTE \u201909, Montreal, Canada, August 10-11, 2009. USENIX Association (2009). https:\/\/www.usenix.org\/conference\/evtwote-09\/some-consequences-paper-fingerprinting-elections"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme (extended abstract). In: 26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21-23 October 1985, pp. 372\u2013382. IEEE Computer Society (1985). https:\/\/doi.org\/10.1109\/SFCS.1985.2","DOI":"10.1109\/SFCS.1985.2"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Cortier, V., Galindo, D., K\u00fcsters, R., M\u00fcller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016, pp. 779\u2013798. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/SP.2016.52","DOI":"10.1109\/SP.2016.52"},{"issue":"4","key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101718","volume":"39","author":"P Ehin","year":"2022","unstructured":"Ehin, P., Solvak, M., Willemson, J., Vinkel, P.: Internet voting in Estonia 2005\u20132019: evidence from eleven elections. Gov. Inf. Q. 39(4), 101718 (2022). https:\/\/doi.org\/10.1016\/j.giq.2022.101718","journal-title":"Gov. Inf. Q."},{"issue":"1","key":"13_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1089\/elj.2010.0098","volume":"11","author":"SN Goggin","year":"2012","unstructured":"Goggin, S.N., Byrne, M.D., Gilbert, J.E.: Post-election auditing: effects of procedure and ballot type on manual counting accuracy, efficiency, and auditor satisfaction and confidence. Elect. Law J. Rules Polit. Policy 11(1), 36\u201351 (2012)","journal-title":"Elect. Law J. Rules Polit. Policy"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-319-52240-1_6","volume-title":"Electronic Voting","author":"S Heiberg","year":"2017","unstructured":"Heiberg, S., Martens, T., Vinkel, P., Willemson, J.: Improving the verifiability of the Estonian internet voting scheme. In: Krimmer, R. (ed.) E-Vote-ID 2016. LNCS, vol. 10141, pp. 92\u2013107. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52240-1_6"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Heiberg, S., Willemson, J.: Modeling threats of a voting method. In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 128\u2013148. IGI Global (2014)","DOI":"10.4018\/978-1-4666-5820-2.ch007"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Heiberg, S., Willemson, J.: Verifiable internet voting in Estonia. In: Krimmer, R., Volkamer, M. (eds.) 6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau \/ Bregenz, Austria, October 29-31, 2014, pp.\u00a01\u20138. IEEE (2014). https:\/\/doi.org\/10.1109\/EVOTE.2014.7001135","DOI":"10.1109\/EVOTE.2014.7001135"},{"key":"13_CR18","first-page":"349","volume":"26","author":"I Koutsoulias","year":"2018","unstructured":"Koutsoulias, I.: Ballot selfies: balancing the right to speak out on political issues and the right to vote free from improper influence and coercion. J. Law Policy 26, 349\u2013394 (2018)","journal-title":"J. Law Policy"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-15497-3_24","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S Kremer","year":"2010","unstructured":"Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389\u2013404. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_24"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-030-00419-4_9","volume-title":"Electronic Voting","author":"K Krips","year":"2018","unstructured":"Krips, K., Willemson, J., V\u00e4rv, S.: Implementing an audio side channel for paper voting. In: Krimmer, R., et al. (eds.) E-Vote-ID 2018. LNCS, vol. 11143, pp. 132\u2013145. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00419-4_9"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Krips, K., Willemson, J., V\u00e4rv, S.: Is your vote overheard? A new scalable side-channel attack against paper voting. In: IEEE European Symposium on Security and Privacy, EuroS &P 2019, Stockholm, Sweden, June 17-19, 2019, pp. 621\u2013634. IEEE (2019). https:\/\/doi.org\/10.1109\/EuroSP.2019.00051","DOI":"10.1109\/EuroSP.2019.00051"},{"key":"13_CR22","unstructured":"Moser, F., et al.: A study of mechanisms for end-to-end verifiable online voting. Tech. rep., BSI (2024). https:\/\/www.bsi.bund.de\/EN\/Service-Navi\/Publikationen\/Studien\/Verifiable_Online-Voting\/Verifiable_Online-Voting_node.html"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Pereira, O.: Individual Verifiability and Revoting in the Estonian Internet Voting System. In: Matsuo, S., et al. (eds.) Financial Cryptography and Data Security. FC 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13412, pp. 315\u2013324. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-32415-4_21","DOI":"10.1007\/978-3-031-32415-4_21"},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Toreini, E., Shahandashti, S.F., Hao, F.: Texture to the rescue: practical paper fingerprinting based on texture patterns. ACM Trans. Priv. Secur. 20(3), 9:1\u20139:29 (2017). https:\/\/doi.org\/10.1145\/3092816","DOI":"10.1145\/3092816"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05036-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:21Z","timestamp":1757488941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05036-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032050359","9783032050366"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05036-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nancy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id-2025.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}