Abstract
This paper presents MarkPledge3 (MP3), the most efficient specification of the MarkPledge (MP) technique. The MP technique allows the voter to verify that her vote is correctly encrypted with a soundness of 1 − 2− α, with 20 ≤ α ≤ 30, just by performing a match of a small string (4-5 characters). Due to its simplicity, verifying the election public data (vote encryptions and tally) in MP3 is 2.6 times faster than with MP2 and the vote encryption creation on devices with low computational power, e.g. smart cards, is approximately 6 times better than the best of the previous MP specifications (MP1 and MP2).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adida, B.: Advances in Cryptographic Voting Systems. Ph.D. thesis, MIT (August 2006)
Adida, B.: Helios: Web-based open-audit voting. In: 17th USENIX Security Symposium (2008)
Adida, B., Neff, A.: Ballot casting assurance. In: EVT 2006. USENIX/ACCURATE, Vancouver, B.C. (2006)
Adida, B., Neff, A.: Efficient receipt-free ballot casting resistant to covert channels. In: EVT/WOTE 2009. USENIX/ACCURATE/IAVOSS, Montreal, Canada (August 2009)
Benaloh, J.: Simple verifiable elections. In: EVT 2006. USENIX/ACCURATE, Vancouver, B.C. (2006)
Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: EVT 2007. USENIX/ACCURATE, Boston, MA (2007)
Benaloh, J.C.: Verifiable Secret-Ballot Elections. Ph.D. thesis, Yale University (1987)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Chaum, D.: Secret-ballot receipts: True voter-verifiable election. IEEE Security & Privacy 02(1), 38–47 (2004)
Chaum, D.: Punchscan (September 2009), http://www.punchscan.org/
Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Clarkson, M., Chong, S., Myers, A.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354–368 (May 2008)
Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
ElGamal, T.: A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)
Joaquim, R., Ribeiro, C.: An efficient and highly sound voter verification technique and its implementation - extended version. Tech. Rep. 40/2011, INESC-ID (September 2011)
Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: A Voter Verifiable Code Voting System. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol. 5767, pp. 106–121. Springer, Heidelberg (2009)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: WPES, Alexandria, Virginia, USA, pp. 61–70 (November 2005)
Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006), http://www.seas.harvard.edu/~talm/papers/MN06-voting.pdf
Neff, C.A.: Practical high certainty intent verification for encrypted votes (2004), http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.134.1006&rep=rep1&type=pdf
NIST: Gigital signature standard (dss) (June 2009), http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf , FIPS 186-3
Okamoto, T.: Receipt-free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)
Sandler, D., Derr, K., Wallach, D.S.: Votebox: A tamper-evident verifiable electronic voting system. In: 16th USENIX Security Symposium (2007)
Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security, pp. 106–110 (2009)
Wikipedia: (April 2011), http://en.wikipedia.org/wiki/Exponentiation_by_squaring#Computation_by_powers_of_2
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joaquim, R., Ribeiro, C. (2012). An Efficient and Highly Sound Voter Verification Technique and Its Implementation. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-32747-6_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32746-9
Online ISBN: 978-3-642-32747-6
eBook Packages: Computer ScienceComputer Science (R0)