Skip to main content
Top

2020 | OriginalPaper | Chapter

LOKI Vote: A Blockchain-Based Coercion Resistant E-Voting Protocol

Authors : Marwa Chaieb, Souheib Yousfi

Published in: Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Creating an online electronic voting system that ensures coercion-resistance and end-to-end verifiability at the same time, has constituted a real challenge for a long period of time. The notion of coercion-resistance was first introduced by Juels, Catalano, and Jakobsson (JCJ) in 2005. Since that time, several research papers have appeared to address the main issue of JCJ scheme (the quadratic complexity of verifying credentials). The majority of these systems have been based on the availability of a secure web bulletin board. Despite this widespread requirement, the notion of an append-only web bulletin board remains vague, and no method of constructing such a bulletin board has been proposed in those papers. Our paper fills the gap and proposes an end-to-end verifiable e-voting protocol based on Blockchain technology. In this research work, we propose a Blockchain-based online electronic voting protocol that ensures all the security requirements expected from secure and democratic elections. Our proposal is inspired from the scheme proposed by Araùjo and Traoré in 2013, which is based on the work of JCJ and has a linear complexity. Called LOKI Vote, our scheme is practical for large scale elections and ensures a strong privacy for voters by using a variety of cryptographic primitives. Additionally, our protocol enhance the complexity of the old coercion resistant systems by using a new mix network, called Low Latency Anonymous Routing Protocol, which is characterized by a lower complexity and a higher level of security. Finally, we formally prove the security of LOKI Vote using the automated verification tool, ProVerif, and the Applied Pi-Calculus modeling language.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., di Vimercati, S.D.C., Dingledine, R., (eds.) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, 7 November 2005, pp. 61–70. ACM (2005) Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., di Vimercati, S.D.C., Dingledine, R., (eds.) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, 7 November 2005, pp. 61–70. ACM (2005)
6.
go back to reference Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: Reiter, M.K., Samarati, P. (eds.) CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, 6–8 November 2001, pp. 116–125. ACM (2001) Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: Reiter, M.K., Samarati, P. (eds.) CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, 6–8 November 2001, pp. 116–125. ACM (2001)
7.
go back to reference Weber, S.G., Araújo, R., Buchmann, J.A.: On coercion-resistant electronic elections with linear work. In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, 10–13 April 2007, Vienna, Austria, pp. 908–916. IEEE Computer Society (2007) Weber, S.G., Araújo, R., Buchmann, J.A.: On coercion-resistant electronic elections with linear work. In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, 10–13 April 2007, Vienna, Austria, pp. 908–916. IEEE Computer Society (2007)
8.
go back to reference Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: IEEE Symposium on Security and Privacy (S&P 2008), 18–21 May 2008, Oakland, California, USA, pp. 354–368. IEEE Computer Society (2008) Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: IEEE Symposium on Security and Privacy (S&P 2008), 18–21 May 2008, Oakland, California, USA, pp. 354–368. IEEE Computer Society (2008)
11.
go back to reference Rønne, P.B., Atashpendar, A., Gjøsteen, K., Ryan, P.Y.A.: Coercion-resistant voting in linear time via fully homomorphic encryption: towards a quantum-safe scheme. CoRR abs/1901.02560 (2019) Rønne, P.B., Atashpendar, A., Gjøsteen, K., Ryan, P.Y.A.: Coercion-resistant voting in linear time via fully homomorphic encryption: towards a quantum-safe scheme. CoRR abs/1901.02560 (2019)
13.
go back to reference Schweisgut, J.: Coercion-resistant electronic elections with observer. In: Krimmer, R. (ed.) Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, 2nd–4th August 2006. Castle Hofen, Bregenz, Austria, vol. P-86, pp. 171–177. LNI, G I (2006) Schweisgut, J.: Coercion-resistant electronic elections with observer. In: Krimmer, R. (ed.) Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, 2nd–4th August 2006. Castle Hofen, Bregenz, Austria, vol. P-86, pp. 171–177. LNI, G I (2006)
14.
go back to reference Cachin, C., Kursawe, K., Shoup, V.: Random oracles in constantinople: practical asynchronous byzantine agreement using cryptography. J. Cryptol. 18(3), 219–246 (2005)MathSciNetCrossRef Cachin, C., Kursawe, K., Shoup, V.: Random oracles in constantinople: practical asynchronous byzantine agreement using cryptography. J. Cryptol. 18(3), 219–246 (2005)MathSciNetCrossRef
15.
go back to reference Furukawa, J., Sako, K.: An efficient publicly verifiable mix-net for long inputs. IEICE Trans. 90-A(1), 113–127 (2007) Furukawa, J., Sako, K.: An efficient publicly verifiable mix-net for long inputs. IEICE Trans. 90-A(1), 113–127 (2007)
16.
go back to reference Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: [36], pp. 31–53 Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: [36], pp. 31–53
17.
go back to reference Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: [36], pp. 89–105 Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: [36], pp. 89–105
19.
go back to reference Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Oliveira, R., Felber, P., Hu, Y.C., (eds.) Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, 23–26 April 2018, pp. 30:1–30:15. ACM (2018) Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Oliveira, R., Felber, P., Hu, Y.C., (eds.) Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, 23–26 April 2018, pp. 30:1–30:15. ACM (2018)
20.
go back to reference Dimtiriou, T.: Efficient, coercion-free and universally verifiable blockchain-based voting. IACR Cryptology ePrint Archive 2019, 1406 (2019) Dimtiriou, T.: Efficient, coercion-free and universally verifiable blockchain-based voting. IACR Cryptology ePrint Archive 2019, 1406 (2019)
21.
go back to reference Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, 25–29 October 2004, pp. 132–145. ACM (2004) Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, 25–29 October 2004, pp. 132–145. ACM (2004)
25.
go back to reference Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef
26.
go back to reference Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: Simon, J., (ed.) Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 2–4 May 1988, Chicago, Illinois, USA, pp. 103–112. ACM (1988) Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: Simon, J., (ed.) Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 2–4 May 1988, Chicago, Illinois, USA, pp. 103–112. ACM (1988)
27.
go back to reference Blum, M., Santis, A.D., Micali, S., Persiano, G.: Noninteractive zero-knowledge. SIAM J. Comput. 20(6), 1084–1118 (1991)MathSciNetCrossRef Blum, M., Santis, A.D., Micali, S., Persiano, G.: Noninteractive zero-knowledge. SIAM J. Comput. 20(6), 1084–1118 (1991)MathSciNetCrossRef
29.
go back to reference Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret: theory and applications of ring signatures. In: Goldreich, O., Rosenberg, A.L., Selman, A.L. (eds.) Theoretical Computer Science. LNCS, vol. 3895, pp. 164–186. Springer, Heidelberg (2006). https://doi.org/10.1007/11685654_7CrossRef Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret: theory and applications of ring signatures. In: Goldreich, O., Rosenberg, A.L., Selman, A.L. (eds.) Theoretical Computer Science. LNCS, vol. 3895, pp. 164–186. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11685654_​7CrossRef
30.
31.
go back to reference Noether, S., Mackenzie, A.: Ring confidential transactions. Ledger 1, 1–18 (2016)CrossRef Noether, S., Mackenzie, A.: Ring confidential transactions. Ledger 1, 1–18 (2016)CrossRef
33.
go back to reference Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435–487 (2009)CrossRef Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435–487 (2009)CrossRef
34.
go back to reference Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. J. ACM 65(1), 1:1–1:41 (2018) Abadi, M., Blanchet, B., Fournet, C.: The applied pi calculus: mobile values, new names, and secure communication. J. ACM 65(1), 1:1–1:41 (2018)
35.
go back to reference Dreier, J., Lafourcade, P., Lakhnech, Y.: A formal taxonomy of privacy in voting protocols. In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, 10–15 June 2012, pp. 6710–6715. IEEE (2012) Dreier, J., Lafourcade, P., Lakhnech, Y.: A formal taxonomy of privacy in voting protocols. In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, 10–15 June 2012, pp. 6710–6715. IEEE (2012)
Metadata
Title
LOKI Vote: A Blockchain-Based Coercion Resistant E-Voting Protocol
Authors
Marwa Chaieb
Souheib Yousfi
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-63396-7_11

Premium Partner