Skip to main content

2016 | OriginalPaper | Buchkapitel

DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities

verfasst von : Siamak F. Shahandashti, Feng Hao

Erschienen in: Computer Security – ESORICS 2016

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the election using random factors that will later cancel out and allow the public to verify the tally after the election. While the removal of tallying authorities significantly simplifies election management, the pre-computation of ballots necessitates secure ballot storage, as leakage of precomputed ballots endangers voter privacy. In this paper, we address this problem and propose DRE-ip (DRE-i with enhanced privacy). Adopting a different design strategy, DRE-ip is able to encrypt ballots in real time in such a way that the election tally can be publicly verified without decrypting the cast ballots. As a result, DRE-ip achieves end-to-end verifiability without tallying authorities, similar to DRE-i, but with a significantly stronger guarantee on voter privacy. In the event that the voting machine is fully compromised, the assurance on tallying integrity remains intact and the information leakage is limited to the minimum: only the partial tally at the time of compromise is leaked.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
See, for instance, [23] and the references within for an overview of available solutions to secure data deletion.
 
Literatur
1.
Zurück zum Zitat Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008) Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008)
2.
Zurück zum Zitat Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: EVT/WOTE 2009, p. 10. USENIX (2009) Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: EVT/WOTE 2009, p. 10. USENIX (2009)
3.
Zurück zum Zitat Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: ACM Symposium on Principles of Distributed Computing, PODC 2001, pp. 274–283. ACM (2001) Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: ACM Symposium on Principles of Distributed Computing, PODC 2001, pp. 274–283. ACM (2001)
4.
Zurück zum Zitat Bell, S., Benaloh, J., Byrne, M.D., DeBeauvoir, D., Eakin, B., Fisher, G., Kortum, P., McBurnett, N., Montoya, J., Parker, M., Pereira, O., Stark, P.B., Wallach, D.S., Winn, M.: STAR-Vote: a secure, transparent, auditable, and reliable voting system. USENIX J. Election Technol. Syst. 1(1), 18–37 (2013) Bell, S., Benaloh, J., Byrne, M.D., DeBeauvoir, D., Eakin, B., Fisher, G., Kortum, P., McBurnett, N., Montoya, J., Parker, M., Pereira, O., Stark, P.B., Wallach, D.S., Winn, M.: STAR-Vote: a secure, transparent, auditable, and reliable voting system. USENIX J. Election Technol. Syst. 1(1), 18–37 (2013)
5.
Zurück zum Zitat Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)CrossRef Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)CrossRef
6.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62–73. ACM (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62–73. ACM (1993)
7.
Zurück zum Zitat Ben-Nun, J., Llewellyn, M., Riva, B., Rosen, A., Ta-Shma, A., Wikström, D.: A new implementation of a dual (paper and cryptographic) voting system. In: EVOTE 2012: 5th International Conference on Electronic Voting, pp. 315–329 (2012) Ben-Nun, J., Llewellyn, M., Riva, B., Rosen, A., Ta-Shma, A., Wikström, D.: A new implementation of a dual (paper and cryptographic) voting system. In: EVOTE 2012: 5th International Conference on Electronic Voting, pp. 315–329 (2012)
8.
Zurück zum Zitat Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: USENIX Workshop on Accurate E-Voting Technology (EVT), p. 14 (2007) Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: USENIX Workshop on Accurate E-Voting Technology (EVT), p. 14 (2007)
9.
Zurück zum Zitat Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: ACM Symposium on Theory of Computing, STOC 1994, pp. 544–553. ACM (1994) Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: ACM Symposium on Theory of Computing, STOC 1994, pp. 544–553. ACM (1994)
10.
Zurück zum Zitat Benaloh, J.D.C.: Verifiable Secret-Ballot Elections. Ph.d. thesis, Department of Computer Science, Yale University (1987) Benaloh, J.D.C.: Verifiable Secret-Ballot Elections. Ph.d. thesis, Department of Computer Science, Yale University (1987)
11.
Zurück zum Zitat Bohli, J.-M., Müller-Quade, J., Röhrich, S.: Bingo voting: secure and coercion-free voting using a trusted random number generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 111–124. Springer, Heidelberg (2007) Bohli, J.-M., Müller-Quade, J., Röhrich, S.: Bingo voting: secure and coercion-free voting using a trusted random number generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 111–124. Springer, Heidelberg (2007)
12.
Zurück zum Zitat Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)CrossRef Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)CrossRef
13.
Zurück zum Zitat Carback, R., Chaum, D., Clark, J., Conway, J., Essex, A., Herrnson, P., Mayberry, T., Popoveniuc, S., Rivest, R., Shen, E., Sherman, A., Vora, P.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: USENIX Security Symposium, pp. 291–306 (2010) Carback, R., Chaum, D., Clark, J., Conway, J., Essex, A., Herrnson, P., Mayberry, T., Popoveniuc, S., Rivest, R., Shen, E., Sherman, A., Vora, P.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: USENIX Security Symposium, pp. 291–306 (2010)
14.
Zurück zum Zitat Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R., Ryan, P., Shen, E., Sherman, A., Vora, P.: Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Foren. Secur. 4(4), 611–627 (2009)CrossRef Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R., Ryan, P., Shen, E., Sherman, A., Vora, P.: Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Foren. Secur. 4(4), 611–627 (2009)CrossRef
15.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
16.
Zurück zum Zitat Chaum, D.L.: Secret-ballot receipts: true voter-vrifiable elections. IEEE Secur. Priv. 2(1), 38–47 (2004)CrossRef Chaum, D.L.: Secret-ballot receipts: true voter-vrifiable elections. IEEE Secur. Priv. 2(1), 38–47 (2004)CrossRef
17.
Zurück zum Zitat Cramer, R., Damgård, I.B., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994) Cramer, R., Damgård, I.B., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)
18.
Zurück zum Zitat Culnane, C., Ryan, P.Y.A., Schneider, S., Teague, V.: vVote: a verifiable voting system. ACM Trans. Inf. Syst. Secur. 18(1), 3:1–3:30 (2015)CrossRef Culnane, C., Ryan, P.Y.A., Schneider, S., Teague, V.: vVote: a verifiable voting system. ACM Trans. Inf. Syst. Secur. 18(1), 3:1–3:30 (2015)CrossRef
20.
Zurück zum Zitat Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)CrossRef Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)CrossRef
21.
Zurück zum Zitat Fisher, K., Carback, R., Sherman, A.T.: Punchscan: introduction and system definition of a high-integrity election system. In: Workshop on Trustworthy Elections (WOTE) (2006) Fisher, K., Carback, R., Sherman, A.T.: Punchscan: introduction and system definition of a high-integrity election system. In: Workshop on Trustworthy Elections (WOTE) (2006)
22.
Zurück zum Zitat Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRefMATH Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRefMATH
23.
Zurück zum Zitat Hao, F., Clarke, D., Zorzo, A.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2015)CrossRef Hao, F., Clarke, D., Zorzo, A.: Deleting secret data with public verifiability. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2015)CrossRef
24.
Zurück zum Zitat Hao, F., Kreeger, M.N., Randell, B., Clarke, D., Shahandashti, S.F., Lee, P.H.-J.: Every vote counts: ensuring integrity in large-scale electronic voting. USENIX J. Election Technol. Syst. 2(3), 1–25 (2014) Hao, F., Kreeger, M.N., Randell, B., Clarke, D., Shahandashti, S.F., Lee, P.H.-J.: Every vote counts: ensuring integrity in large-scale electronic voting. USENIX J. Election Technol. Syst. 2(3), 1–25 (2014)
25.
Zurück zum Zitat Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Privacy in Electronic Society, WPES 2005, pp. 61–70. ACM (2005) Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Privacy in Electronic Society, WPES 2005, pp. 61–70. ACM (2005)
26.
Zurück zum Zitat Lim, A.: Travis County, TX developing electronic voting system with a paper trail. Government Technology, July 2014. www.govtech.com. Accessed October 2015 Lim, A.: Travis County, TX developing electronic voting system with a paper trail. Government Technology, July 2014. www.​govtech.​com. Accessed October 2015
27.
Zurück zum Zitat Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefMATH Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefMATH
29.
Zurück zum Zitat Ryan, P., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Foren. Secur. 4(4), 662–673 (2009)CrossRef Ryan, P., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Prêt à voter: a voter-verifiable voting system. IEEE Trans. Inf. Foren. Secur. 4(4), 662–673 (2009)CrossRef
30.
Zurück zum Zitat Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)CrossRef Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)CrossRef
31.
Zurück zum Zitat Sandler, D., Derr, K., Wallach, D.S.: VoteBox: a tamper-evident, verifiable electronic voting system. In: USENIX Security Symposium, vol. 4, p. 87 (2008) Sandler, D., Derr, K., Wallach, D.S.: VoteBox: a tamper-evident, verifiable electronic voting system. In: USENIX Security Symposium, vol. 4, p. 87 (2008)
Metadaten
Titel
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
verfasst von
Siamak F. Shahandashti
Feng Hao
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-45741-3_12