Dragoljub M Pilipovic, Djordje Babic

DOI Number
First page
Last page


E-voting is a service or system which serves to get individual human inputs and to sumarize them to a ceratain group decision. Usually, e-voting is a take for e-government part, but in this paper we consider e-voting for particular and specific population. The proposed e-voting system is intended for student population and student parliament election. In this paper, we describe concept of P.U.T. (personal unique token) and ways to distribute P.U.T.s to students. At the end, we present a software which is designed for the student parliament use case.


e-voting, EVS (electronic voting system), P.U.T., randomizer, secure distribution, student parliament, UML (unified modeling language).

Full Text:



Project World Map of E-Voting.CC GmbH, [Online]. Available at: http://www.e-voting.cc/en/itelections/world-map/ (current 2015).

D. Pilipović, “Razvoj, trenutno stanje i perspektive e-glasanja“ (in Serbian), In Proc. Infoteh ‟14, Jahorina, pp. 1225-1228, 2014.

D. Chaum, “Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms”, Communications of the ACM, vol 24, no 2, pp. 84-90, 1981.

T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, “Analysis of an Electronic Voting System”, In Proc. of IEEE Symposium on Security and Privacy, pp. 27–40, 2004.

Electronic Voting Machine Information Sheet, Sequoia Voting Systems AVC Edge, Version 1.1., EFF (Electronic Frontier Foundation), 2006.

J. Bannet, D. W. Price, A. Rudys, J. Singer, and D. S. Wallach, “Hack-a-vote: Security issues with electronic voting systems”, IEEE Security and Privacy, vol. 2, no. 1), pp. 32–7, 2004.

D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner, “A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)”, 2004, [Online]. Available at: http://www.servesecurityreport. org (current January 2004).

C. A. Neff, “A verifiable secret shuffle and its application to e-voting”, ACM Conference on Computer and Communications Security, pp. 116–125, 2001.

M. Jakobsson, A. Juels, and R. L. Rivest, “Making Mix Nets Robust for Electronic Voting by Randomised Partial Checking”, In Proc. of the 11th USENIX Security Symposium, Berkeley, pp. 339– 53, 2002.

D. Wikström, “A Sender Verifiable Mix-Net and a New Proof of a Shuffle”, In Proc. of the Advances in Cryptology - ASIACRYPT 2005, pp. 273–92, 2005.

G. Dini, “A secure and available electronic voting service for a large-scale distributed system”, Future Generation Computer Systems, vol. 19, no. 1 , pp. 69-85, 2003.

Yu-Yi Chen, Jinn-ke Jan, and Chin-Ling Chen, “The design of a secure anonymous Internet voting system”, Computers & Security, vol. 23, no. 4, pp. 330-337, 2004.

R. Cramer, R. Gennaro, and B. Schoenmakers, “A Secure and Optimally Efficient Multi-Authority Election Scheme”, European Transactions On Telecommunications 8, pp. 481–490, 1997.

M. Hirt and K. Sako, “Efficient Receipt-Free Voting Based on Homomorphic Encryption”, In Proc. of the Advances in Cryptology - EUROCRYPT 2000, Bruges Belgium, pp. 539–56, 2000.

P. Ryan, “A Variant of the Chaum Voter-verifiable Scheme”, In Proceedings of the workshop on Issues in the theory of security, WITS ‟05, New York, pp. 81–88, 2005.

V. D. Besselaar, et. al. “Experiments with E-Voting Technology: Experiences and Lessons”, Building the Knowledge Economy: Issues, Applications, Case Studies, IOS Press, 2003. [17] E. Dahlstrom, J. D. Walker, and C. Dziuban, “ECAR study of undergraduate students and information technology”, Boulder, CO: EDUCAUSE Center for Applied Research, 2012.

M. R. Jeffreys, Nursing student retention: Understanding the process and making a difference, Springer Publishing Company, 2012.

T. Nyundu, K. Naidoo, and T. Chagonda, “Getting Involved on Campus: Student Identities, Student Politics, and Perceptions of the Student Representative Council (SRC)”, JSSA Vol 6, pp. 149-161, 2015

J. Norman, Chinese, Cambridge University Press. 1988, p. 73.

D. Pilipović, “Međunarodni standardi i preporuke kod elektronskog glasanja” (in Serbian), Infoteh 14, Jahorina, pp. 1233-1236, 2014.

C. Larman, “Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development”, Prentice Hall PTR, 2004

C. Z. Acemyan , P. Kortum , M. D. Byrne, and D. S. Wallach, Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II, USENIX Journal of Election Technology and Systems (JETS), vol. 2, no. 3, July 2014.

A. Essex, J. Clark, R. T. Carback, and S. Popoveniuc, "Punchscan in practice: An E2E election case study", In Proc. 2007 IAVoSS Workshop on Trustworthy Elections (WOTE), Ottawa, Canada, 2007.

M. Bär, C. Henrich, J. Müller-Quade, S. Röhrich, and C. Stüber, Real World Experiences with Bingo Voting and a Comparison of Usability, Workshop On Trustworthy Elections, WOTE 2008, 2008.

R. Krimmer, A. Ehringfeld, M. Traxl, The Use of E-Voting in the Austrian Federation of Students Elections 2009., In Proc. of the 4th International Conference EVOTE 2010, 2010.

K. Lee, Y. Lee, D. Won, and S. Kim, Protection Profile for Secure E-Voting Systems, ISPEC 2010, LNCS 6047, pp. 386–397, 2010.

J.H. Espedahlen, Attack trees describing security in distributed internet-enabled metrology. Master‟s thesis, Department of Computer Science and Media Technology, Gjøvik University College, 2007.

S. Kremer, M. Ryan, and B. Smyth, Election Verifiability in Electronic Voting Protocols, ESORICS 2010, LNCS 6345, pp. 389–404, 2010.


  • There are currently no refbacks.

ISSN: 0353-3670 (Print)

ISSN: 2217-5997 (Online)

COBISS.SR-ID 12826626