Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority

被引:1
|
作者
Najarkolaei, Seyed Reza Hoseini [1 ]
Kazempour, Nargess [1 ]
Aref, Mohammad Reza [1 ]
Gunduz, Deniz [2 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Imperial Coll London, Informat Proc & Commun Lab, London, England
关键词
Private voting; multi-party computation; secret sharing; CONSENSUS; SCHEME;
D O I
10.1109/ITW54588.2022.9965845
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a private voting system that consists of N voters who may vote to one of the K candidates or vote abstain. Each voter wants to compute the final tally, while staying private and robust against malicious voters, who try to gain information about the vote of the other voters beyond the final result, or send incorrect information to affect the final tally. We design an information-theoretic voting system that uses verifiable secret sharing and multi-party computation, which is secure and private as long as there are up to. [ N-1/3] malicious voters.
引用
收藏
页码:374 / 379
页数:6
相关论文
共 50 条
  • [1] Information-Theoretically Secure Erasure Codes for Distributed Storage
    Rashmi, K. V.
    Shah, Nihar B.
    Ramchandran, Kannan
    Kumar, P. Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1621 - 1646
  • [2] Information-theoretically Secure Regenerating Codes for Distributed Storage
    Shah, Nihar B.
    Rashmi, K. V.
    Kumar, P. Vijay
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [3] Secure distributed constraint satisfaction: reaching agreement without revealing private information
    Yokoo, M
    Suzuki, K
    Hirayama, K
    [J]. ARTIFICIAL INTELLIGENCE, 2005, 161 (1-2) : 229 - 245
  • [4] An information-theoretically secure quantum multiparty private set intersection
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [5] Secure Attribute-based Threshold Signature without a Trusted Central Authority
    Sun Changxia
    Ma Wenping
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (12) : 2899 - 2905
  • [6] Private Information Retrieval for Secure Distributed Storage Systems
    Yang, Heecheol
    Shin, Wonjae
    Lee, Jungwoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 2953 - 2964
  • [7] Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    Feng, Da
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [8] Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information
    Gunlu, Onur
    Schaefer, Rafael F.
    Boche, Holger
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3803 - 3816
  • [9] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [10] INFORMATION THEORETICALLY SECURE KEY EXCHANGE ALGORITHM
    Besoul, Khaldoun
    AL Mahmoud, Qassim
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 111 - 125