Software-based Receipt-freeness in On-line Elections

  • Emmanouil Magkos
  • Vassilios Chrissikopoulos
  • Nikos Alexandris
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 78)


Electronic elections could be a viable alternative for real-life elections in a democratic society. In traditional elections, a voting booth does more than allow voters to keep their vote secret. The voting booth actually requires that voters vote secretly. If the privacy of the vote was allowed but not required, then a voter could easily sell his vote to a vote-buyer, or be coerced by a coercer. We present a receipt-free election scheme without making any hardware or physical assumptions about the communication channel between the voter and the voting authorities. Our solution is software-based i.e. voters are able to exercise their electoral rights from their home by using a personal computer with Internet access. The only physical assumption we make use of is an untappable channel between the two voting authorities that are employed in our scheme. This scheme satisfies most requirements of a secure electronic election. We make use of well-known cryptographic techniques such as time-lock puzzles and blind signatures.


Receipt-freeness electronic voting privacy 


  1. [1]
    D. Alpert, D. Ellard, O. Kavazovic, M. Scheff. Receipt-Free Secure Elections 6.857 Final Project, 6.857 Network and Computer Security, 1998,
  2. [2]
    J. Benaloh, D. Tuinstra. Receipt-free secret-ballot elections, 26th Annual ACM Symposium on the Theory of Computing, Proceedings, 1994, pp. 544–553.Google Scholar
  3. [3]
    R. Canetti, C. Dwork, M. Naor, R. Ostrovsky. Deniable Encryption, Advances in Cryptology-CRYPTO 97, Proceedings, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag 1997, pp. 90–104.MathSciNetCrossRefMATHGoogle Scholar
  4. [4]
    D. Chaum. Blind Signatures for Untraceable Payments, Advances in Cryptology-CRYPTO 82, Proceedings, Plenum Press 1982, pp. 199–203.Google Scholar
  5. [5]
    L. Cottrell. Mixmaster and Remailer Attacks,
  6. [6]
    L. Cranor, R. Cytron. Sensus: A security-conscious electronic polling system for the Internet, Hawaii International Conference on System Sciences, Proceedings, 1997,
  7. [7]
    M. Franklin, M. Reiter. Fair exchange with a semi-trusted third party, 4th ACM Conference on Computer and Communications Security, Proceedings, ACM 1997, pp. 1–6.Google Scholar
  8. [8]
    D. Goldschlag, M. Reed, P. Syverson. Onion Routing for Anonymous and Private Communications, Communications of the ACM, Vol. 42(2), pp. ACM 1999, pp. 39–41.CrossRefGoogle Scholar
  9. [9]
    M. Hirt, K. Sako. Eficient Receipt-fie Voting Based on Homomorphic Encyption, Advances in Cryptology-EUROCRYPT 2000, Proceedings, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag 2000, pp 539–556.CrossRefMATHGoogle Scholar
  10. [10]
    B. Lee, K. Kim. Receipt-free Electronic Voting through Collaboration of Voter and Honest Verifier, JWISC 2000, Proceedings, 2000, pp. 101–108.Google Scholar
  11. [11]
    Y. Mu, V. Varadharajan. Anonymous Secure e-voting over a network, 14th Annual Computer Security Application Conference, Proceedings, IEEE Computer Society 1998, pp. 293–299.Google Scholar
  12. [12]
    V. Niemi, A. Renvall. How to prevent Buying of Votes in Computer Elections, Advances in Cryptology-ASIACRYPT 94, Proceedings, Lecture Notes in Computer Science, Vol. 917, Springer-Verlag 1994, pp. 141–148.MATHGoogle Scholar
  13. [13]
    T. Okamoto. An Electronic Voting Scheme, IFIP’ 96, Proceedings, Advanced IT Tools, Chapman & Hall 1996, pp. 21–30.Google Scholar
  14. [14]
    T. Okamoto. Receipt-Free Electronic Voting schemes for Large Scale Elections, Workshop of Security Protocols’ 97, Proceedings, Lecture Notes in Computer Science, Vol. 1163, Springer-Verlag 1996, pp. 125–132.CrossRefGoogle Scholar
  15. [15]
    A. Riera, J. Borrell, J. Rifa. An uncoercibleverifiable electronic voting protocol, 14th International Information Security Conference IFIP/SEC’98, Proceedings, 1998, pp. 206–215.Google Scholar
  16. [16]
    R. Rivest, A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, ACM 1978, pp. 120–126.MathSciNetCrossRefMATHGoogle Scholar
  17. [17]
    R. Rivest, A. Shamir, D. Wagner. Time-Lock Puzzles and Timed-Released Crypto, LCS Technical Memo MIT/LCS/TR-684, 1996,
  18. [18]
    K. Sako. Electronic Voting Scheme Allowing Open Objection to the Tally, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Proceedings, Vol. E77-A(1), 1994, pp. 24–30.Google Scholar
  19. [19]
    K. Sako, J. Killian. Receipt-Free Mix-Type Voting Schemes-A practical solution to the implementation of voting booth, Advances in Cryptology-EUROCRYPT 95, Lecture Notes in Computer Science, Vol. 921, Springer-Verlag 1995, pp. 393–403.CrossRefMATHGoogle Scholar
  20. [20]
    B. Schneier. Applied Cryptography-Protocols, Algorithms and Source Code in C, 2nd Edition, 1996.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2002

Authors and Affiliations

  • Emmanouil Magkos
    • 1
  • Vassilios Chrissikopoulos
    • 2
  • Nikos Alexandris
    • 1
  1. 1.Department of InformaticsUniversity of PiraeusPiraeusGreece
  2. 2.Department of Archiving and Libmry StudiesIonian UniversityCorfuGreece

Personalised recommendations