Abstract
We solve an 18 year open problem on e-voting. While most research on e-voting is focused on MIX servers, or on homomorphic encryption based schemes, or on blind signatures schemes, the issue raised by Cohen (Benaloh) is usually ignored. Cohen, using a trusted center, developed a yes/no voting scheme in which the outcome is revealed, keeping the tally private. In 1986, Benaloh and Yung posed as open problem how to do this without a trusted center.
In this paper, we generalize Cohen’s privacy concern in the context of yes/no voting. We allow multiple candidates or write-ins and multi-seat elections in which there is more than one seat to be filled by the election. We study how to announce the winner(s), without revealing the tally. We present schemes for such multi-seat elections satisfying the extra privacy constraint. Our schemes are based on proven secure primitives and do not need a trusted center.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abe, M.: Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-centers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437–447. Springer, Heidelberg (1998)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, May 2-4, pp. 1–10 (1988)
Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proc. of ACM 26th STOC, pp. 544–553 (1994)
Benaloh, J.C., Yung, M.: Distributing the Power of a Government to Enhance the Privacy of Voters. PODC, pp. 52–62 (1986)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, ACM, pp. 84–88 (1981)
Cohen, J.D.: Improving privacy in cryptographic elections, http://research.microsoft.com/crypto/papers/privel.ps
Chaum, D.: Zero-knowledge undeniable signatures. In: Eurocrypt 1991, pp. 458–464 (1991)
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, May 2-4, pp. 11–19 (1988)
Cramer, R., Damgard, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: STOC 1991, pp. 542–552 (1991)
Gash, M.: Dean urges Wisconsin to ignore the polls showing him behind. USA Today and The Associated Press (February 9, 2004), www.usatoday.com/news/politicselections/nation/president/2004-02-09-dean-wisconsin_x.htm
Furukawa, J., Miyauchi, H., Mori, K., Obana, S., Sako, K.: An implementation of a universally verifiable electronic voting scheme based on shuffling. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, Springer, Heidelberg (2003)
Furukawa, J., Sako, K.: An efficient scheme for proving a shuffle. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 368–387. Springer, Heidelberg (2001)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth annual ACM Symp. Theory of Computing, STOC, May 25-27, pp. 218–229 (1987)
Hevia, A., Kiwi, M.A.: Electronic Jury Voting Protocols. In: LATIN 2002, pp. 415–429 (2002)
Hirt, M., Sako, K.: Efficient receipt-free voting based homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)
Jakobsson, M.: A practical MIX. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 448–461. Springer, Heidelberg (1998)
Jakobsson, M., Juels, A.: Mix and Match: Secure Function Evaluation via Ciphertexts. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 162–177. Springer, Heidelberg (2000)
Ogata, W., Kurosawa, K., Sako, K., Takatani, K.: Fault Tolerant Anonymous Channel. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 440–444. Springer, Heidelberg (1997)
Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Pfitzmann, B., Pfitzmann, A.: How to break the direct RSA-implementation of MIXes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 373–381. Springer, Heidelberg (1990)
Schnorr, C.P.: Efficient Signature Generation for Smart Cards. In: Advances in Cryptology-Proceedings of Crypto 1989, pp. 239–252 (1989)
Schnorr, C.P., Jakobsson, M.: Security of Discrete Log Cryptosystems in the Random Oracle + Generic Model, http://www.bell-labs.com/user/markusj/
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)
Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Tsiounis, Y., Yung, M.: On the security of ElGamal based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y., Kurosawa, K. (2005). Electronic Voting: Starting Over?. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556992_24
Download citation
DOI: https://doi.org/10.1007/11556992_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29001-8
Online ISBN: 978-3-540-31930-6
eBook Packages: Computer ScienceComputer Science (R0)