Improving and Simplifying a Variant of Prêt à Voter

  • Ralf Küsters
  • Tomasz Truderung
  • Andreas Vogt
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5767)

Abstract

Recently, Xia et al. proposed a variant of Prêt à Voter which enjoys several attractive properties. Their protocol is among the few verifiable and receipt-free paper-based voting protocols resistant against randomization attacks. Trust is distributed among several authorities and the voter interface is relatively simple. Also, approval and ranked elections are supported.

In this paper, we improve and simplify the protocol by Xia et al. Among others, we propose a simpler way of producing ballots, which only involves the encryption and re-encryption of candidate names; homomorphic encryption and proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abe, M.: Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437–447. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  2. 2.
    Adida, B.: Advances in Cryptographic Voting Systems. PhD thesis, MIT Department of Electrical Engineering and Computer Science (2006)Google Scholar
  3. 3.
    Adida, B., Rivest, R.L.: Scratch & vote: self-contained paper-based cryptographic voting. In: Workshop on Privacy in the Electronic Society (WPES 2006), pp. 29–40 (2006)Google Scholar
  4. 4.
    Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (STOC 1994), pp. 544–553. ACM Press, New York (1994)CrossRefGoogle Scholar
  5. 5.
    Bohli, J.-M., Müller-Quade, J., Röhrich, S.: Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 111–124. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security & Privacy 2(1), 38–47 (2004)CrossRefGoogle Scholar
  8. 8.
    Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. In: Dill, D.L., Kohno, T. (eds.) USENIX/ACCURATE Electronic Voting Technology (EVT 2008). USENIX Association (2008)Google Scholar
  9. 9.
    Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical, voter-verifiable election scheme. In: de di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  11. 11.
    Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1), 51–83 (2007)MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. In: Boneh, D. (ed.) Proceedings of the 11th USENIX Security Symposium, pp. 339–353 (2002)Google Scholar
  13. 13.
    Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of Workshop on Privacy in the Eletronic Society (WPES 2005). ACM Press, New York (2005)Google Scholar
  14. 14.
    Kelsey, J., Regenscheid, A., Moran, T., Chaum, D.: Scratch off attacks on end-to-end voting systems. In: Rump Session of the 28th Annual International Cryptology Conference, CRYPTO 2008 (2008)Google Scholar
  15. 15.
    Küsters, R., Truderung, T.: An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. In: 2009 IEEE Symposium on Security and Privacy (S&P 2009), pp. 251–266. IEEE Computer Society, Los Alamitos (2009)CrossRefGoogle Scholar
  16. 16.
    Lundin, D., Ryan, P.Y.A.: Human Readable Paper Verification of Prêt à Voter. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 379–395. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  17. 17.
    Moran, T., Naor, M.: Split-ballot voting: everlasting privacy with distributed trust. In: ACM Conference on Computer and Communications Security (CCS 2007), pp. 246–255 (2007)Google Scholar
  18. 18.
    Neff, C.A.: Practical High Certainty Intent Verification for Encrypted Votes, http://www.votehere.com/old/vhti/documentation/vsv-2.0.3638.pdf
  19. 19.
    Popoveniuc, S., Hosp, B.: An introduction to PunchScan. In: IAVoSS Workshop on Trustworthy Elections, WOTE 2007 (2007)Google Scholar
  20. 20.
    Riva, B., Ta-Shma, A.: Bare-Handed Electronic Voting with pre-processing. In: USENIX/ACCURATE Electronic Voting Technology, EVT 2007 (2007)Google Scholar
  21. 21.
    Rivest, R.L., Smith, W.D.: Three Voting Protocols: ThreeBallot, VAV and Twin. In: USENIX/ACCURATE Electronic Voting Technology, EVT 2007 (2007)Google Scholar
  22. 22.
    Ryan, P.Y.A.: A variant of the Chaum voter-verifiable scheme. In: Water, Innovation, Technology & Sustainability (WITS 2005), pp. 81–88 (2005)Google Scholar
  23. 23.
    Ryan, P.Y.A.: Prêt à Voter with Paillier Encryption. Technical Report CS-TR 1014, University of Newcastle upon Tyne (2008)Google Scholar
  24. 24.
    Ryan, P.Y.A., Schneider, S.A.: Prêt à Voter with Re-encryption Mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 313–326. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  25. 25.
    Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme — A practical solution to the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  26. 26.
    Xia, Z., Schneider, S.A., Heather, J., Traoré, J.: Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: Dill, D.L., Kohno, T. (eds.) USENIX/ACCURATE Electronic Voting Technology (EVT 2008). USENIX Association (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ralf Küsters
    • 1
  • Tomasz Truderung
    • 1
  • Andreas Vogt
    • 1
  1. 1.University of TrierGermany

Personalised recommendations