Skip to main content
Top

2019 | OriginalPaper | Chapter

Belenios: A Simple Private and Verifiable Electronic Voting System

Authors : Véronique Cortier, Pierrick Gaudry, Stéphane Glondu

Published in: Foundations of Security, Protocols, and Equational Reasoning

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present the electronic voting protocol Belenios together with its associated voting platform. Belenios guarantees vote privacy and full verifiability, even against a compromised voting server. While the core of the voting protocol was already described and formally proved secure, we detail here the complete voting system from the setup to the tally and the recovery procedures.
We comment on the use of Belenios in practice. In particular, we discuss the security choices made by election administrators w.r.t. the decryption key and the delegation of some setup tasks to the voting platform.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Exigences techniques et administratives applicables au vote électronique. Chancellerie fédérale ChF (2014). Swiss recommendation on e-voting Exigences techniques et administratives applicables au vote électronique. Chancellerie fédérale ChF (2014). Swiss recommendation on e-voting
3.
go back to reference Adida, B.: Helios: web-based open-audit voting. In: 17th USENIX Security Symposium (Usenix 2008), pp. 335–348 (2008) Adida, B.: Helios: web-based open-audit voting. In: 17th USENIX Security Symposium (Usenix 2008), pp. 335–348 (2008)
4.
go back to reference Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, August 2009 Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, August 2009
7.
go back to reference Bell, S., et al.: STAR-vote: a secure, transparent, auditable, and reliable voting system. In: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2013) (2013) Bell, S., et al.: STAR-vote: a secure, transparent, auditable, and reliable voting system. In: Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2013) (2013)
8.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993 (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993 (1993)
9.
go back to reference Benaloh, J.: Simple verifiable elections. In: USENIX Security Symposium (EVT 2006) (2006) Benaloh, J.: Simple verifiable elections. In: USENIX Security Symposium (EVT 2006) (2006)
10.
go back to reference Bernhard, D., Cortier, V., Galindo, D., Pereira, O., Warinschi, B.: A comprehensive analysis of game-based ballot privacy definitions. In: 36th IEEE Symposium on Security and Privacy (S&P 2015), pp. 499–516. IEEE Computer Society Press, May 2015 Bernhard, D., Cortier, V., Galindo, D., Pereira, O., Warinschi, B.: A comprehensive analysis of game-based ballot privacy definitions. In: 36th IEEE Symposium on Security and Privacy (S&P 2015), pp. 499–516. IEEE Computer Society Press, May 2015
14.
go back to reference Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: a non-interactive receipt-free electronic voting scheme. In: 23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria, pp. 1614–1625 (2016) Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: a non-interactive receipt-free electronic voting scheme. In: 23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria, pp. 1614–1625 (2016)
15.
go back to reference Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: IEEE Symposium on Security and Privacy (S&P 2008), pp. 354–368. IEEE Computer Society (2008) Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: IEEE Symposium on Security and Privacy (S&P 2008), pp. 354–368. IEEE Computer Society (2008)
16.
go back to reference Cortier, V., Dragan, C.C., Strub, P.-Y., Dupressoir, F., Warinschi, B.: Machine-checked proofs for electronic voting: privacy and verifiability for Belenios. In: 31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 298–312 (2018) Cortier, V., Dragan, C.C., Strub, P.-Y., Dupressoir, F., Warinschi, B.: Machine-checked proofs for electronic voting: privacy and verifiability for Belenios. In: 31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 298–312 (2018)
17.
go back to reference Cortier, V., Galindo, D., Glondu, S., Izabachene, M.: Distributed ElGamal à la Pedersen - application to Helios. In: Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany (2013) Cortier, V., Galindo, D., Glondu, S., Izabachene, M.: Distributed ElGamal à la Pedersen - application to Helios. In: Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany (2013)
19.
go back to reference Cortier, V., Galindo, D., Küsters, R., Müller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: 36th IEEE Symposium on Security and Privacy (S&P 2016), pp. 779–798, San Jose, USA, May 2016 Cortier, V., Galindo, D., Küsters, R., Müller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: 36th IEEE Symposium on Security and Privacy (S&P 2016), pp. 779–798, San Jose, USA, May 2016
20.
go back to reference Cortier, V., Lallemand, J.: Voting: you can’t have privacy without individual verifiability. In: 25th ACM Conference on Computer and Communications Security (CCS 2018), pp. 53–66. ACM (2018) Cortier, V., Lallemand, J.: Voting: you can’t have privacy without individual verifiability. In: 25th ACM Conference on Computer and Communications Security (CCS 2018), pp. 53–66. ACM (2018)
21.
go back to reference Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89–148 (2013)CrossRef Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89–148 (2013)CrossRef
22.
go back to reference Cuvelier, E., Pereira, O., Peters, T.: Election verifiability or ballot privacy: do we need to choose? In: 18th European Symposium on Research in Computer Security (ESORICS 2013), pp. 481–498 (2013) Cuvelier, E., Pereira, O., Peters, T.: Election verifiability or ballot privacy: do we need to choose? In: 18th European Symposium on Research in Computer Security (ESORICS 2013), pp. 481–498 (2013)
23.
go back to reference Filipiak, A.: Design and formal analysis of security protocols, an application to electronic voting and mobile payment. Ph.D. thesis, Université de Lorraine, March 2018 Filipiak, A.: Design and formal analysis of security protocols, an application to electronic voting and mobile payment. Ph.D. thesis, Université de Lorraine, March 2018
27.
go back to reference Haenni, R., Koenig, R.E., Locher, P., Dubuis, E.: CHVote system specification. Cryptology ePrint Archive, Report 2017/325 (2017) Haenni, R., Koenig, R.E., Locher, P., Dubuis, E.: CHVote system specification. Cryptology ePrint Archive, Report 2017/325 (2017)
29.
go back to reference Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Workshop on Privacy in the Electronic Society (WPES 2005), pp. 61–70. ACM (2005) Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Workshop on Privacy in the Electronic Society (WPES 2005), pp. 61–70. ACM (2005)
30.
go back to reference Kiayias, A., Zacharias, T., Zhang, B.: DEMOS-2: scalable E2E verifiable elections without random oracles. In: ACM Conference on Computer and Communications Security (CCS 2015) (2015) Kiayias, A., Zacharias, T., Zhang, B.: DEMOS-2: scalable E2E verifiable elections without random oracles. In: ACM Conference on Computer and Communications Security (CCS 2015) (2015)
31.
go back to reference Küsters, R., Müller, J., Scapin, E., Truderung, T.: sElect: a lightweight verifiable remote voting system. In: 29th IEEE Computer Security Foundations Symposium (CSF 2016), pp. 341–354 (2016) Küsters, R., Müller, J., Scapin, E., Truderung, T.: sElect: a lightweight verifiable remote voting system. In: 29th IEEE Computer Security Foundations Symposium (CSF 2016), pp. 341–354 (2016)
32.
go back to reference Küsters, R., Truderung, T., Vogt, A.: Accountabiliy: definition and relationship to verifiability. In: 17th ACM Conference on Computer and Communications Security (CCS 2010), pp. 526–535 (2010) Küsters, R., Truderung, T., Vogt, A.: Accountabiliy: definition and relationship to verifiability. In: 17th ACM Conference on Computer and Communications Security (CCS 2010), pp. 526–535 (2010)
35.
go back to reference Ryan, P.: Prêt à Voter with Paillier encryption. Math. Comput. Model. 48(9–10), 1646–1662 (2008)CrossRef Ryan, P.: Prêt à Voter with Paillier encryption. Math. Comput. Model. 48(9–10), 1646–1662 (2008)CrossRef
37.
go back to reference Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: 25th IEEE Computer Security Foundations Symposium (CSF 2012), pp. 78–94 (2012) Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: 25th IEEE Computer Security Foundations Symposium (CSF 2012), pp. 78–94 (2012)
38.
go back to reference Springall, D., et al.: Security analysis of the Estonian Internet voting system. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 703–715 (2004) Springall, D., et al.: Security analysis of the Estonian Internet voting system. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 703–715 (2004)
39.
go back to reference Swamy, N., et al.: Dependent types and multi-monadic effects in F*. In: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2016), pp. 256–270. ACM (2016) Swamy, N., et al.: Dependent types and multi-monadic effects in F*. In: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2016), pp. 256–270. ACM (2016)
Metadata
Title
Belenios: A Simple Private and Verifiable Electronic Voting System
Authors
Véronique Cortier
Pierrick Gaudry
Stéphane Glondu
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19052-1_14

Premium Partner