Skip to main content
Top
Published in: Annals of Telecommunications 7-8/2016

01-08-2016

Receipt-free remote electronic elections with everlasting privacy

Authors: Philipp Locher, Rolf Haenni

Published in: Annals of Telecommunications | Issue 7-8/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present a new cryptographic voting protocol for remote electronic voting that offers three of the most challenging features of such protocols: verifiability, everlasting privacy, and receipt-freeness. Trusted authorities and computational assumptions are only needed during vote casting and tallying to prevent the creation of invalid ballots and to achieve receipt-freeness and fairness, but not to guarantee vote privacy. The implementation of everlasting privacy is based on perfectly hiding commitments and non-interactive zero-knowledge proofs, whereas receipt-freeness is realized with mix networks and homomorphic tallying.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
To ensure that generators are independent, they need to be generated in some publicly reproducible way, for example by deriving them from a common reference string.
 
2
We are aware that requiring a secure platform is a strong assumption. We do not explicitly address this problem in this paper, but our protocol allows voters at least to detect a compromised platform as long as they can read the bulletin board in a secure way.
 
3
To ensure that u has been computed from fresh values (α,β,γ), the voter could be asked to prove knowledge of (α,β,γ) by computing \(\mathit {NIZKP}[(\alpha ,\beta ,\gamma ):u = h_{1}^{\alpha }h_{2}^{\beta }h_{3}^{\gamma }]\). As this is not an essential step for our protocol, we omit it in our presentation.
 
4
At first sight, it may appear that π 2 and π 3 are very similar proofs, but a subtle difference disallows π 2 to be implemented as a standard preimage proof. The subtlety lies in the fact that u and \(\hat {u}\) are both elements of \(\mathbb {G}_{q}\), but to use u as input of \(\text {com}_{p}:\mathbb {Z}_{p}\times \mathbb {Z}_{p}\rightarrow \mathcal {G}_{p}\), it needs to be interpreted as an element of \(\mathbb {Z}_{p}\). As a consequence, com p is not a group homomorphism with respect to (α,β,γ), i.e., the preconditions for constructing a preimage proof are not satisfied.
 
5
The bulletin board could also accept multiple copies of the same ballot, which then need to be eliminated in the tallying phase. But this makes preventing replay and board flooding attacks more complicated.
 
6
Shuffling and decrypting a list of ciphertexts can be performed in a single serial process [38]. This is an optional implementation variant of our protocol, which we do not pursue here.
 
7
By mixing up list and set operations in one expression, we slightly abuse standard mathematical notation.
 
8
Some lists are implicitly given: E F (follows from B), \(\mathbf {E}^{\prime }\) (follows from \(\mathbf {EF}^{\prime }\)), F H (follows from H and \(\mathbf {EF}^{\prime }\)), and \(\mathbf {V}^{\prime }\) (follows from V). As such, they need not to be published, but we include them for improved clarity.
 
9
In case x is shared among multiple authorities, the literal y = h x in π 4 can be replaced by a disjunction \(\bigvee _{\!j} (y_{j}=h^{x_{i}})\), where x i is a single private key share of an individual trusted authority and y j are corresponding public values of all trusted authorities. In this way, null votes can be generated individually by a single trusted authority.
 
10
An additive vote encoding capable of representing all possible election results is necessary for this.
 
11
The security parameter K determines the soundness of the proof. We adopt the recommendation of K≥80 from [4].
 
Literature
1.
go back to reference Arapinis M, Cortier V, Kremer S, Ryan M (2013) Practical everlasting privacy. In: Basin D, Mitchell J (eds) POST’13, 2nd conference on principles of security and trust, LNCS 7796, Rome, pp 21–40 Arapinis M, Cortier V, Kremer S, Ryan M (2013) Practical everlasting privacy. In: Basin D, Mitchell J (eds) POST’13, 2nd conference on principles of security and trust, LNCS 7796, Rome, pp 21–40
2.
go back to reference Araújo R, Foulle S, Traoré J (2007) A practical and secure coercion-resistant scheme for remote elections. In: Chaum D, Kutylowski M, Rivest RL, Ryan PYA (eds) FEE’07, Workshop on frontiers in electronic elections. Schloss Dagstuhl, Germany, pp 330–342 Araújo R, Foulle S, Traoré J (2007) A practical and secure coercion-resistant scheme for remote elections. In: Chaum D, Kutylowski M, Rivest RL, Ryan PYA (eds) FEE’07, Workshop on frontiers in electronic elections. Schloss Dagstuhl, Germany, pp 330–342
3.
go back to reference Araújo R, Foulle S, Traoré J (2010) A practical and secure coercion-resistant scheme for internet voting. In: Chaum D, Jakobsson M, Rivest R, Ryan PYA, Benaloh J, Kutylowski M, Adida B (eds) Towards trustworthy elections: new directions in electronic voting, LNCS 6000. Springer, pp 330–342 Araújo R, Foulle S, Traoré J (2010) A practical and secure coercion-resistant scheme for internet voting. In: Chaum D, Jakobsson M, Rivest R, Ryan PYA, Benaloh J, Kutylowski M, Adida B (eds) Towards trustworthy elections: new directions in electronic voting, LNCS 6000. Springer, pp 330–342
4.
go back to reference Au MH, Susilo W, Mu Y (2010) Proof-of-knowledge of representation of committed value and its applications. In: Steinfeld R, Hawkes P (eds) ACISP’10, 15th Australasian conference on information security and privacy, LNCS 6168, Sydney, pp 352–369 Au MH, Susilo W, Mu Y (2010) Proof-of-knowledge of representation of committed value and its applications. In: Steinfeld R, Hawkes P (eds) ACISP’10, 15th Australasian conference on information security and privacy, LNCS 6168, Sydney, pp 352–369
5.
go back to reference Bayer S, Groth J (2012) Efficient zero-knowledge argument for correctness of a shuffle. In: Pointcheval D, Johansson T (eds) EUROCRYPT’12, 31st annual international conference on theory and applications of cryptographic techniques, LNCS 7237, Cambridge, pp 263–280 Bayer S, Groth J (2012) Efficient zero-knowledge argument for correctness of a shuffle. In: Pointcheval D, Johansson T (eds) EUROCRYPT’12, 31st annual international conference on theory and applications of cryptographic techniques, LNCS 7237, Cambridge, pp 263–280
6.
go back to reference Bayer S, Groth J (2013) Zero-knowledge argument for polynomial evaluation with application to blacklists. In: Johansson T, Nguyen PQ (eds) EUROCRYPT’13, 32nd annual international conference on the theory and applications of cryptographic techniques, LNCS 7881, Athens, pp 646–663 Bayer S, Groth J (2013) Zero-knowledge argument for polynomial evaluation with application to blacklists. In: Johansson T, Nguyen PQ (eds) EUROCRYPT’13, 32nd annual international conference on the theory and applications of cryptographic techniques, LNCS 7881, Athens, pp 646–663
7.
go back to reference Benaloh J, Tuinstra D (1994) Receipt-free secret-ballot elections. In: STOC’94, 26th Annual ACM symposium on theory of computing. Montréal, pp 544–553 Benaloh J, Tuinstra D (1994) Receipt-free secret-ballot elections. In: STOC’94, 26th Annual ACM symposium on theory of computing. Montréal, pp 544–553
8.
go back to reference Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press
9.
go back to reference Brands S, Demuynck L, De Decker B (2007) A practical system for globally revoking the unlinkable pseudonyms of unknown users. In: Pieprzyk J, Ghodosi H, Dawson E (eds) ACISP’07, 12th Australasian conference on information security and privacy, LNCS 4586, Townsville, pp 400–415 Brands S, Demuynck L, De Decker B (2007) A practical system for globally revoking the unlinkable pseudonyms of unknown users. In: Pieprzyk J, Ghodosi H, Dawson E (eds) ACISP’07, 12th Australasian conference on information security and privacy, LNCS 4586, Townsville, pp 400–415
10.
go back to reference Buchmann J, Demirel D, van de Graaf J (2013) Towards a publicly-verifiable mix-net providing everlasting privacy. In: Sadeghi AR (ed) FC’13, 17th International conference on financial cryptography, LNCS 7859, Okinawa, pp 197–204 Buchmann J, Demirel D, van de Graaf J (2013) Towards a publicly-verifiable mix-net providing everlasting privacy. In: Sadeghi AR (ed) FC’13, 17th International conference on financial cryptography, LNCS 7859, Okinawa, pp 197–204
11.
go back to reference Camenisch J, Chaabouni R, Shelat A (2008) Efficient protocols for set membership and range proofs. In: Pieprzyk J (ed) ASIACRYPT’08, 14th International conference on the theory and application of cryptology and information security, LNCS 5350, Melbourne, pp 234–252 Camenisch J, Chaabouni R, Shelat A (2008) Efficient protocols for set membership and range proofs. In: Pieprzyk J (ed) ASIACRYPT’08, 14th International conference on the theory and application of cryptology and information security, LNCS 5350, Melbourne, pp 234–252
12.
go back to reference Camenisch J, Stadler M (1997) Efficient group signature schemes for large groups. In: Kaliski BS Jr (ed) CRYPTO’97, 17th Annual international cryptology conference on advances in cryptology, LNCS 1294, Santa Barbara, pp 410–424 Camenisch J, Stadler M (1997) Efficient group signature schemes for large groups. In: Kaliski BS Jr (ed) CRYPTO’97, 17th Annual international cryptology conference on advances in cryptology, LNCS 1294, Santa Barbara, pp 410–424
13.
go back to reference Canard S, Traoré J (2003) List signature schemes and application to electronic voting. In: Augot D, Charpin P, Kabatianski G (eds) WCC’03, 3rd International workshop on coding and cryptography, Versailles, pp 81–90 Canard S, Traoré J (2003) List signature schemes and application to electronic voting. In: Augot D, Charpin P, Kabatianski G (eds) WCC’03, 3rd International workshop on coding and cryptography, Versailles, pp 81–90
14.
15.
go back to reference Clark J, Hengartner U (2011) Selections: internet voting with over-the-shoulder coercion-resistance. In: Danezis G (ed) FC’11, 15th International conference on financial cryptography, LNCS 7035, St. Lucia, pp 47–61 Clark J, Hengartner U (2011) Selections: internet voting with over-the-shoulder coercion-resistance. In: Danezis G (ed) FC’11, 15th International conference on financial cryptography, LNCS 7035, St. Lucia, pp 47–61
16.
go back to reference Cranor LF, Cytron RK (1996) Design and implementation of a practical security-conscious electronic polling system. Tech. Rep. WUCS-96-02. Washington University Cranor LF, Cytron RK (1996) Design and implementation of a practical security-conscious electronic polling system. Tech. Rep. WUCS-96-02. Washington University
17.
go back to reference Cuvelier E, Pereira O, Peters T (2013) Election verifiability or ballot privacy : Do we need to choose? In: Crampton J, Jajodia S, Mayes K (eds) ESORICS’13, 18th European conference on research in computer security, LNCS 8134, Egham, pp 481–498 Cuvelier E, Pereira O, Peters T (2013) Election verifiability or ballot privacy : Do we need to choose? In: Crampton J, Jajodia S, Mayes K (eds) ESORICS’13, 18th European conference on research in computer security, LNCS 8134, Egham, pp 481–498
18.
go back to reference Demirel D, Henning M, van de Graaf J, Ryan PYA, Buchmann (2013) Pret à Voter̂ providing everlasting privacy. In: Heather J, Schneider S, Teague V (eds) VoteID’13, 4th International conference on e-voting and identity, LNCS 7985, Guildford, pp 156–175 Demirel D, Henning M, van de Graaf J, Ryan PYA, Buchmann (2013) Pret à Voter̂ providing everlasting privacy. In: Heather J, Schneider S, Teague V (eds) VoteID’13, 4th International conference on e-voting and identity, LNCS 7985, Guildford, pp 156–175
19.
go back to reference Demirel D, van de Graaf J, Araújo R (2012) Improving Helios with everlasting privacy towards the public. In: Halderman JA, Pereira O (eds) EVT/WOTE’12, Electronic voting technology workshop/workshop on trustworthy elections, Bellevue Demirel D, van de Graaf J, Araújo R (2012) Improving Helios with everlasting privacy towards the public. In: Halderman JA, Pereira O (eds) EVT/WOTE’12, Electronic voting technology workshop/workshop on trustworthy elections, Bellevue
20.
go back to reference Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko AM (ed) CRYPTO’86, 6th Annual international cryptology conference on advances in cryptology, Santa Barbara, pp 186–194 Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko AM (ed) CRYPTO’86, 6th Annual international cryptology conference on advances in cryptology, Santa Barbara, pp 186–194
21.
go back to reference Fujioka A, Okamoto T, Ohta K (1992) A practical secret voting scheme for large scale elections. In: Seberry J, Zheng Y (eds) ASIACRYPT’92, Workshop on the theory and application of cryptographic techniques, LNCS 718, Gold Coast, pp 244–251 Fujioka A, Okamoto T, Ohta K (1992) A practical secret voting scheme for large scale elections. In: Seberry J, Zheng Y (eds) ASIACRYPT’92, Workshop on the theory and application of cryptographic techniques, LNCS 718, Gold Coast, pp 244–251
22.
go back to reference Groth J (2005) Non-interactive zero-knowledge arguments for voting. In: Ioannidis J, Keromytis A, Yung M (eds) ACNS’05, 3th International conference on applied cryptography and network security, LNCS 3531, New York, pp 467–482 Groth J (2005) Non-interactive zero-knowledge arguments for voting. In: Ioannidis J, Keromytis A, Yung M (eds) ACNS’05, 3th International conference on applied cryptography and network security, LNCS 3531, New York, pp 467–482
23.
go back to reference Haenni R, Koenig RE (2013) A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes. Comput Secur 33:59–69CrossRef Haenni R, Koenig RE (2013) A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes. Comput Secur 33:59–69CrossRef
24.
go back to reference Hirt M, Sako K (2000) Efficient receipt-free voting based on homomorphic encryption. In: Goos G, Hartmanis J, van Leeuwen J (eds) EUROCRYPT’00, 19th International conference on the theory and applications of cryptographic techniques, LNCS 1807, Bruges, pp 539–556 Hirt M, Sako K (2000) Efficient receipt-free voting based on homomorphic encryption. In: Goos G, Hartmanis J, van Leeuwen J (eds) EUROCRYPT’00, 19th International conference on the theory and applications of cryptographic techniques, LNCS 1807, Bruges, pp 539–556
25.
go back to reference Juang WS, Liaw HT (2004) Fair blind threshold signatures in wallet with observers. J Syst Softw 72 (1):25–31CrossRef Juang WS, Liaw HT (2004) Fair blind threshold signatures in wallet with observers. J Syst Softw 72 (1):25–31CrossRef
26.
go back to reference Juels A, Catalano D, Jakobsson M (2005) Coercion-resistant electronic elections. In: Atluri V, De Capitani di Vimercati S, Dingledine R (eds) WPES’05, 4th ACM workshop on privacy in the electronic society, Alexandria, pp 61–70 Juels A, Catalano D, Jakobsson M (2005) Coercion-resistant electronic elections. In: Atluri V, De Capitani di Vimercati S, Dingledine R (eds) WPES’05, 4th ACM workshop on privacy in the electronic society, Alexandria, pp 61–70
27.
go back to reference Kulyk O, Teague V, Volkamer M (2015) Extending helios towards private eligibility verifiability. In: Haenni R, Koenig RE, Wikström D (eds) VoteID’15, 5th International conference on e-voting and identity, LNCS 9269, Bern, pp 57–73 Kulyk O, Teague V, Volkamer M (2015) Extending helios towards private eligibility verifiability. In: Haenni R, Koenig RE, Wikström D (eds) VoteID’15, 5th International conference on e-voting and identity, LNCS 9269, Bern, pp 57–73
28.
go back to reference Locher P, Haenni R (2015) Verifiable internet elections with everlasting privacy and minimal trust. In: Haenni R, Koenig RE, Wikström D (eds) VoteID’15, 5th International conference on e-voting and identity, LNCS 9269, Bern, pp 74–91 Locher P, Haenni R (2015) Verifiable internet elections with everlasting privacy and minimal trust. In: Haenni R, Koenig RE, Wikström D (eds) VoteID’15, 5th International conference on e-voting and identity, LNCS 9269, Bern, pp 74–91
29.
go back to reference Moran T, Naor M (2006) Receipt-free universally-verifiable voting with everlasting privacy. In: Dwork C (ed) CRYPTO’06, 26th Annual international cryptology conference on advances in cryptology, LNCS 4117, Santa Barbara, pp 373–392 Moran T, Naor M (2006) Receipt-free universally-verifiable voting with everlasting privacy. In: Dwork C (ed) CRYPTO’06, 26th Annual international cryptology conference on advances in cryptology, LNCS 4117, Santa Barbara, pp 373–392
30.
go back to reference Moran T, Naor M (2007) Split-ballot voting: everlasting privacy with distributed trust. In: Ning P, de Capitani di Vimercati S, Syverson P (eds) CCS’07, 14th ACM conference on computer and communications security, Alexandria, pp 246–255 Moran T, Naor M (2007) Split-ballot voting: everlasting privacy with distributed trust. In: Ning P, de Capitani di Vimercati S, Syverson P (eds) CCS’07, 14th ACM conference on computer and communications security, Alexandria, pp 246–255
31.
go back to reference Moran T, Naor M (2010) Split-ballot voting: everlasting privacy with distributed trust. ACM Trans Inf Syst Secur 13(2):16:1–16:43CrossRef Moran T, Naor M (2010) Split-ballot voting: everlasting privacy with distributed trust. ACM Trans Inf Syst Secur 13(2):16:1–16:43CrossRef
32.
go back to reference Okamoto T (1997) Receipt-free electronic voting schemes for large scale elections. In: Christianson B, Crispo B, Lomas TMA, Roe M (eds) 5th International security protocols workshop, LNCS 1361, Paris, pp 25–35 Okamoto T (1997) Receipt-free electronic voting schemes for large scale elections. In: Christianson B, Crispo B, Lomas TMA, Roe M (eds) 5th International security protocols workshop, LNCS 1361, Paris, pp 25–35
33.
go back to reference Rivest RL, Smith WD (2007) Three voting protocols: ThreeBallot, VAV, and Twin. In: EVT’07, USENIX/ACCURATE Electronic voting technology workshop. Boston Rivest RL, Smith WD (2007) Three voting protocols: ThreeBallot, VAV, and Twin. In: EVT’07, USENIX/ACCURATE Electronic voting technology workshop. Boston
34.
go back to reference Sako K, Kilian J (1995) Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth. In: Guillou LC, Quisquater JJ (eds) EUROCRYPT’95, 14th International conference on the theory and applications of cryptographic techniques, LNCS 921, Saint-Malo, pp 393–403 Sako K, Kilian J (1995) Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth. In: Guillou LC, Quisquater JJ (eds) EUROCRYPT’95, 14th International conference on the theory and applications of cryptographic techniques, LNCS 921, Saint-Malo, pp 393–403
35.
go back to reference Schläpfer M, Haenni R, Koenig RE, Spycher O (2011) Efficient vote authorization in coercion-resistant internet voting. In: Kiayias A, Lipmaa H (eds) VoteID’11, 3rd International conference on e-voting and identity, LNCS 7187, Tallinn, pp 71–88 Schläpfer M, Haenni R, Koenig RE, Spycher O (2011) Efficient vote authorization in coercion-resistant internet voting. In: Kiayias A, Lipmaa H (eds) VoteID’11, 3rd International conference on e-voting and identity, LNCS 7187, Tallinn, pp 71–88
36.
go back to reference Spycher O, Koenig RE, Haenni R, Schläpfer M (2011) A new approach towards coercion-resistant remote e-voting in linear time. In: Danezis G (ed) FC’11, 15th International conference on financial cryptography, LNCS 7035, St. Lucia, pp 182– 189 Spycher O, Koenig RE, Haenni R, Schläpfer M (2011) A new approach towards coercion-resistant remote e-voting in linear time. In: Danezis G (ed) FC’11, 15th International conference on financial cryptography, LNCS 7035, St. Lucia, pp 182– 189
37.
go back to reference Terelius B, Wikström D (2010) Proofs of restricted shuffles. In: Bernstein DJ, Lange T (eds) AFRICACRYPT’10, 3rd International conference on cryptology in Africa, LNCS 6055, Stellenbosch, pp 100–113 Terelius B, Wikström D (2010) Proofs of restricted shuffles. In: Bernstein DJ, Lange T (eds) AFRICACRYPT’10, 3rd International conference on cryptology in Africa, LNCS 6055, Stellenbosch, pp 100–113
38.
go back to reference Wikström D (2009) A commitment-consistent proof of a shuffle. In: Boyd C, González Nieto J (eds) ACISP’09, 14th Australasian conference on information security and privacy, LNCS 5594, Brisbane, pp 407–421 Wikström D (2009) A commitment-consistent proof of a shuffle. In: Boyd C, González Nieto J (eds) ACISP’09, 14th Australasian conference on information security and privacy, LNCS 5594, Brisbane, pp 407–421
39.
go back to reference Xia Z, Schneider S (2006) A new receipt-free e-voting scheme based on blind signature. In: WOTE’06, IAVoSS Workshop on trustworthy elections. Cambridge, pp 127–135 Xia Z, Schneider S (2006) A new receipt-free e-voting scheme based on blind signature. In: WOTE’06, IAVoSS Workshop on trustworthy elections. Cambridge, pp 127–135
Metadata
Title
Receipt-free remote electronic elections with everlasting privacy
Authors
Philipp Locher
Rolf Haenni
Publication date
01-08-2016
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 7-8/2016
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-016-0519-6

Other articles of this Issue 7-8/2016

Annals of Telecommunications 7-8/2016 Go to the issue

Premium Partner