An Efficient E2E Crowd Verifiable E-Voting System

被引:2
|
作者
Zhang, Xinyu [1 ]
Zhang, Bingsheng [1 ]
Kiayias, Aggelos [2 ]
Zacharias, Thomas [2 ]
Ren, Kui [1 ,3 ]
机构
[1] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Edinburgh, Sch Informat, Edinburgh EH8 9YL, Midlothian, Scotland
[3] Key Lab Blockchain & Cyberspace Governance Zhejia, Hangzhou 310007, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Electronic voting; Privacy; Hash functions; Task analysis; Read only memory; Protocols; End-to-end verifiability; E-voting; subversion-resilient; NIZK; SECURITY;
D O I
10.1109/TDSC.2021.3103336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting (e-voting), compared with article voting, has advantages in several aspects. Among those benefits, the ability to audit the electoral process at every stage is one of the most desired features of an e-voting system. In Eurocrypt 2015, Kiayias, Zacharias, and Zhang proposed a new E2E verifiable e-voting system that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, their system comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to precompute a number of ciphertexts for each voter and each possible choice of the voter. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext. In this work, we construct a new e-voting system that retains similar strong E2E characteristics (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.
引用
收藏
页码:3607 / 3620
页数:14
相关论文
共 50 条
  • [31] E-voting - Reply
    不详
    DR DOBBS JOURNAL, 2004, 29 (06): : 8 - 8
  • [32] E-voting fiasco
    不详
    NEW SCIENTIST, 2004, 182 (2445) : 4 - 5
  • [33] Risks of e-voting
    Bishop, Matt
    Wagner, David
    COMMUNICATIONS OF THE ACM, 2007, 50 (11) : 120 - 120
  • [34] MVP: An Efficient Anonymous E-voting Protocol
    Zhou, You
    Zhou, Yian
    Chen, Shigang
    Wu, Samuel S.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [35] Electronic Voting (E-Voting) in Indonesia: Reflection On E-Voting Practices in Some Countries
    Fanida, Eva Hany
    Manda, Darman
    Mandagi, Marthinus
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES (ICSS 2018), 2018, 226 : 150 - 155
  • [36] E-voting flaws
    Slessenger, P
    NEW SCIENTIST, 2003, 180 (2422) : 34 - 34
  • [37] No vote for e-voting
    不详
    NEW SCIENTIST, 2004, 182 (2446) : 7 - 7
  • [38] E-Voting Systems
    Kuesters, Ralf
    SOFTWARE SYSTEMS SAFETY, 2014, 36 : 135 - 164
  • [39] Security in e-voting
    Kuesters, Ralf
    Truderung, Tomasz
    IT-INFORMATION TECHNOLOGY, 2014, 56 (06): : 300 - 306
  • [40] E-Voting on the Blockchain
    Curran, Kevin
    JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2018, 1 (02):