Short Ballot Assumption and Threeballot Voting Protocol

  • Jacek Cichoń
  • Mirosław Kutyłowski
  • Bogdan Wȩglorz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4910)

Abstract

We analyze the Threeballot voting system proposed recently by R. Rivest. We investigate the relation between the number of the candidates in a race and effectiveness of Strauss’ attack. We also show that in a reasonable scenario it is impossible to reconstruct voters’ preferences for a single race with two candidates.

Keywords

e-voting anonymity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Appel, A.W.: How to defeat Rivest’s ThreeBallot voting system. Draft (October 2006), http://www.cs.princeton.edu/~appel/papers/DefeatingThreeBallot.pdf
  2. 2.
    Araújo, R., Custódio, R.F., van de Graaf, J.: A Verifiable Voting Protocol based on Farnel. In: Proceedings of Workshop On Trustworthy Elections(WOTE) (2007), http://research.microsoft.com/conferences/WOTE2007/papers/07.pdf
  3. 3.
    Belote, G., Jones, H., Juang, J.: Threeballot in the field. Draft (2006), http://theory.lcs.mit.edu/classes/6.857/projects/threeBallotPaper.pdf
  4. 4.
    Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Clark, J., Essex, A., Adams, C.: On the Security of Ballot Receipts in E2E Voting Systems. In: Proceedings of Workshop On Trustworthy Elections (WOTE) (2007), http://research.microsoft.com/conferences/WOTE2007/papers/08.pdf
  6. 6.
    Gogolewski, M., Klonowski, M., Kutyłowski, M., Kubiak, P., Lauks, A., Zagórski, F.: Kleptographic Attacks on E-voting Schemes. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 494–508. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Henry, K., Stinson, D.R., Sui, J.: The Effectiveness of Receipt-Based Attacks on ThreeBallot. Cryptology ePrint Archive, http://eprint.iacr.org/2007/287
  8. 8.
    Hosp, B., Popoveniuc, S.: An introduction to Punchscan. In: Threat Analysis for Voting System. A Workshop on Rating Voting Methods VSRW 2006 (2006), http://vote.cs.gwu.edu/vsrw2006/papers/9.pdf
  9. 9.
    Rivest, R.L.: The Threeballot voting system. Draft, Version 10/1/06 (2006)Google Scholar
  10. 10.
    Rivest, R., Smith, W.: Three Voting Protocols: ThreeBallot, VAV, and Twin. In: EVT. Proceedings of USENIX/ACCURATE Electronic Voting Technology Workshop (2007)Google Scholar
  11. 11.
    Strauss, Ch.: A critical review of the triple ballot voting system. part 2: Cracking the triple ballot encryption. Draft (October 8, 2006), http://www.cs.princeton.edu/~appel/voting/Strauss-ThreeBallotCritique2v1.5.pdf
  12. 12.
    Strauss, Ch.: The trouble with triples: A critical review of the triple ballot (3ballot) scheme, part 1. Draft (October 5, 2006), http://www.cs.princeton.edu/~appel/voting/Strauss-TroubleWithTriples.pdf
  13. 13.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Jacek Cichoń
    • 1
  • Mirosław Kutyłowski
    • 1
  • Bogdan Wȩglorz
    • 1
  1. 1.Institute of Mathematics and Computer ScienceWrocław University of Technology 

Personalised recommendations