An Efficient E2E Crowd Verifiable E-Voting System

被引:2
|
作者
Zhang, Xinyu [1 ]
Zhang, Bingsheng [1 ]
Kiayias, Aggelos [2 ]
Zacharias, Thomas [2 ]
Ren, Kui [1 ,3 ]
机构
[1] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Edinburgh, Sch Informat, Edinburgh EH8 9YL, Midlothian, Scotland
[3] Key Lab Blockchain & Cyberspace Governance Zhejia, Hangzhou 310007, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Electronic voting; Privacy; Hash functions; Task analysis; Read only memory; Protocols; End-to-end verifiability; E-voting; subversion-resilient; NIZK; SECURITY;
D O I
10.1109/TDSC.2021.3103336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting (e-voting), compared with article voting, has advantages in several aspects. Among those benefits, the ability to audit the electoral process at every stage is one of the most desired features of an e-voting system. In Eurocrypt 2015, Kiayias, Zacharias, and Zhang proposed a new E2E verifiable e-voting system that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, their system comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to precompute a number of ciphertexts for each voter and each possible choice of the voter. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext. In this work, we construct a new e-voting system that retains similar strong E2E characteristics (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.
引用
收藏
页码:3607 / 3620
页数:14
相关论文
共 50 条
  • [1] An Efficient E2E Verifiable E-voting System without Setup Assumptions
    Kiayias, Aggelos
    Zacharias, Thomas
    Zhang, Bingsheng
    IEEE SECURITY & PRIVACY, 2017, 15 (03) : 14 - 23
  • [2] E2E Verifiable Electronic Voting System for Shareholders
    Bag, Samiran
    Hao, Feng
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 118 - 125
  • [3] E2E Verifiable Borda Count Voting System without Tallying Authorities
    Bag, Samiran
    Azad, Muhammad Ajmal
    Hao, Feng
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [4] A Publicly Verifiable E-Voting System Based on Biometrics
    Liu, Jinhui
    Han, Tianyi
    Tan, Maolin
    Tang, Bo
    Hu, Wei
    Yu, Yong
    CRYPTOGRAPHY, 2023, 7 (04)
  • [5] Verifiable E-Voting System with Receipt-Freeness
    Badr, Marwa Mahmoud
    Sarhan, Amany Mahmoud
    Abdulkader, Hatem
    2014 10TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2014, : 42 - 47
  • [6] A Verifiable E-voting Scheme with Secret Sharing
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Tan, Xing
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 304 - 308
  • [7] Ordinos: A Verifiable Tally-Hiding E-Voting System
    Kuesters, Ralf
    Liedtke, Julian
    Mueller, Johannes
    Rausch, Daniel
    Vogt, Andreas
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 216 - 235
  • [8] Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities
    Harrison, Luke
    Bag, Samiran
    Hao, Feng
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 742 - 752
  • [9] E-voting
    Teske, N
    NEW REPUBLIC, 1999, 221 (17) : 5 - +
  • [10] On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial
    Druliac, Horia
    Bardsley, Matthew
    Riches, Chris
    Dunn, Christian
    Harrison, Luke
    Roy, Bimal
    Hao, Feng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81