Team for Research in
Ubiquitous Secure Technology

Civitas: Toward a Secure Voting System
Andrew C. Myers, Michael Clarkson, Stephen Chong

Citation
Andrew C. Myers, Michael Clarkson, Stephen Chong. "Civitas: Toward a Secure Voting System". IEEE Symposium on Security and Privacy, IEEE, 354-368, May, 2008.

Abstract
Civitas is the first electronic voting system that is coercion-­resistant, univers­ally and voter verifiable, and suitable for remote voting. This paper describes the design and implement­ation of Civitas. Assurance is established in the design through security proofs, and in the implementation through information-­flow security analysis. Experimental results give a quantitative evaluation of the tradeoffs between time, cost, and security.

Electronic downloads

Citation formats  
  • HTML
    Andrew C. Myers, Michael Clarkson, Stephen Chong. <a
    href="http://www.truststc.org/pubs/450.html"
    >Civitas: Toward a Secure Voting System</a>, IEEE
    Symposium on Security and Privacy, IEEE, 354-368, May, 2008.
  • Plain text
    Andrew C. Myers, Michael Clarkson, Stephen Chong.
    "Civitas: Toward a Secure Voting System". IEEE
    Symposium on Security and Privacy, IEEE, 354-368, May, 2008.
  • BibTeX
    @inproceedings{MyersClarksonChong08_CivitasTowardSecureVotingSystem,
        author = {Andrew C. Myers and Michael Clarkson and Stephen
                  Chong},
        title = {Civitas: Toward a Secure Voting System},
        booktitle = {IEEE Symposium on Security and Privacy},
        organization = {IEEE},
        pages = {354-368},
        month = {May},
        year = {2008},
        abstract = {Civitas is the first electronic voting system that
                  is coercion-­resistant, univers­ally and voter
                  verifiable, and suitable for remote voting. This
                  paper describes the design and implement­ation of
                  Civitas. Assurance is established in the design
                  through security proofs, and in the implementation
                  through information-­flow security analysis.
                  Experimental results give a quantitative
                  evaluation of the tradeoffs between time, cost,
                  and security.},
        URL = {http://www.truststc.org/pubs/450.html}
    }
    

Posted by Andrew C. Myers, Ph.D. on 22 Aug 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.