Receipt-free universally-verifiable voting with everlasting privacy

被引:0
|
作者
Moran, Tal [1 ]
Naor, Moni [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
关键词
receipt-free voting human protocol universally composable; formal proof;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first universally verifiable voting scheme that can be based on a general assumption (existence of a non-interactive commitment scheme). Our scheme is also the first receipt-free scheme to give "everlasting privacy" for votes: even a computationally unbounded party does not gain any information about individual votes (other than what can be inferred from the final tally). Our voting protocols are designed to be used in a "traditional" setting, in which voters cast their ballots in a private polling booth (which we model as an untappable channel between the voter and the tallying authority). Following in the footsteps of Chaum and Neff [7,16], our protocol ensures that the integrity of an election cannot be compromised even if the computers running it are all corrupt (although ballot secrecy may be violated in this case). We give a generic voting protocol which we prove to be secure in the Universal Composability model, given that the underlying commitment is universally composable. We also propose a concrete implementation, based on the hardness of discrete log, that is slightly more efficient (and can be used in practice).
引用
收藏
页码:373 / 392
页数:20
相关论文
共 50 条
  • [41] Formal modelling and analysis of receipt-free auction protocols in applied pi
    Dong, Naipeng
    Jonker, Hugo
    Pang, Jun
    [J]. COMPUTERS & SECURITY, 2017, 65 : 405 - 432
  • [42] Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
    Howlader, Jaydeep
    Roy, Sanjit Kumar
    Mal, Ashis Kumar
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 418 - 434
  • [43] A receipt-free coercion-resistant remote internet voting protocol without physical assumptions through deniable encryption and trapdoor commitment scheme
    Meng B.
    Li Z.
    Qin J.
    [J]. Journal of Software, 2010, 5 (09) : 942 - 949
  • [44] A Privacy-Preserving E-voting Scheme with Verifiable Format
    Sun, Yuhong
    Wang, Jiatao
    Li, Fengyin
    [J]. 2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 77 - 85
  • [45] Koinonia: Verifiable E-Voting with Long-term Privacy
    Ge, Huangyi
    Chau, Sze Yiu
    Gonsalves, Victor E.
    Li, Huian
    Wang, Tianhao
    Zou, Xukai
    Li, Ninghui
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 270 - 285
  • [46] A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
    Kulyk, Oksana
    Volkamer, Melanie
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 2842 - 2851
  • [47] Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme
    Bernhard, David
    Kulyk, Oksana
    Volkamer, Melanie
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [48] Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
    Liu, Ting
    Cui, Zhe
    Du, Hongjiang
    Wu, Zhihan
    [J]. International Journal of Network Security, 2021, 23 (02) : 296 - 304
  • [49] Distributed, end-to-end verifiable, and privacy-preserving internet voting systems
    Chondros, Nikos
    Zhang, Bingsheng
    Zacharias, Thomas
    Diamantopoulos, Panos
    Maneas, Stathis
    Patsonakis, Christos
    Delis, Alex
    Kiayias, Aggelos
    Roussopoulos, Mema
    [J]. COMPUTERS & SECURITY, 2019, 83 : 268 - 299
  • [50] Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs
    Verma, Girraj Kumar
    Chamola, Vinay
    Tiwari, Asheesh
    Kumar, Neeraj
    Mishra, Dheerendra
    Rana, Saurabh
    Barnawi, Ahmed
    [J]. Ad Hoc Networks, 2025, 166