Abstract
We propose a new approach to verifiability of Internet e-voting procedures: correct counting of each single ballot can be checked, but verification is a zero-knowledge court procedure. After verification period is over, certain keys are destroyed and breaking vote privacy becomes substantially harder.
Our main goal is to provide a framework for the political situation in which the voters are more concerned about disclosure of their preferences than about the correctness of the results. Our approach also responds to threats of coercion exercised by a physically present coercer.
Our approach can be used on top of most previous schemes to improve their privacy features. It is limited to the cases when the voters hold electronic ID cards.
Partially supported by Polish Ministry of Science and Higher Education, grant N N206 2701 33. The second author has been also supported by Foundation for Polish Science within the MISTRZ Programme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dagstuhl Accord (2007), http://www.dagstuhlaccord.org/
The E-vote 2011-project Electronic Voting. 2011, http://www.regjeringen.no/en/dep/krd/kampanjer/election_portal/electronic-voting.html?id=437385
Top-to-bottom Review. Top-to-bottom Report Conducted by Secretary of State Debra Bowen of Many of the Voting Systems Certified for Use in California (2007), http://www.sos.ca.gov/elections/elections_vsr.htm
Adida, B.: Helios: Web-based Open-Audit Voting. In: USENIX Security Symposium 2008, USENIX Association, pp. 335–348 (2008), ISBN 978-1-931971-60-7
Baer, W.S., Borisov, N., Danezis, G., Guerses, S.F., Klonowski, M., Kutyłowski, M., Maier-Rabler, U., Moran, T., Pfitzmann, A., Preneel, B., Sadeghi, A.-R., Vedel, T., Westen, T., Zagórski, F., Dutton, W.H.: Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society. In: Social Science Research Network, 1521222 (2009), http://ssrn.com/abstract=1521222
Chaum, D.: Punchscan (2005), http://www.punchscan.org
Chaum, D., Antwerpen, H.V.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)
Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.: Scantegrity II: End-to-End Voter-Verifiable Optical Scan Election Systems Using Invisible Ink Confirmation Codes. In: USENIX/ACCURATE EVT 2008 (2008)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Desmedt, Y., Estehghari, S.: Hacking Helios and its Impact. CRYPTO 2009 rump session (2009), http://www.cs.ucl.ac.uk/staff/Y.Desmedt/IACR/
Desmedt, Y., Kurosawa, K.: Electronic Voting: Starting Over? In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 329–343. Springer, Heidelberg (2005)
Garrido, J.M., Schlesinger, R.: Principles of Modern Operating Systems. Jones and Barlett Publishers (2008), ISBN 0-7637-3574-4
Gjøsteen, K.: Analysis of an Internet Voting Protocol. http://www.regjeringen.no/en/dep/krd/kampanjer/election_portal/electronic-voting/news-about-the-e-vote-2011-project/year/2010/Description-of-cryptografhic-protocol-.html?id=594906
Gogolewski, M., Klonowski, M., Kutyłowski, M., Kubiak, P., Lauks, A., Zagórski, F.: Kleptographic Attacks on E-voting Schemes. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 494–508. Springer, Heidelberg (2006)
Gołȩbiewski, Z., Kutyłowski, M., Zagórski, F.: Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 191–202. Springer, Heidelberg (2006)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: ACM Workshop on Privacy in the Electronic Society, pp. 61–70. ACM, New York (2005)
Kutyłowski, M., Zagórski, F.: Coercion-free Internet Voting with Receipts. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 199–213. Springer, Heidelberg (2007)
Kutyłowski, M., Zagórski, F.: Scratch, Click & Vote: E2E Voting over the Internet’. Cryptology ePrint Archive: Report 2008/314. In: Towards Trustworthy Election Systems, in State-of-the-Art Survey Series. Springer, Heidelberg (2008) (to appear), http://eprint.iacr.org/2008/314
Popoveniuc, S., Lundin, D.: A Simple Technique for Safely Using Punchscan and Pret a Voter in Mail-in Elections. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 150–155. Springer, Heidelberg (2007)
Rivest, R.L., Smith, W.D.: Three Voting Protocols: Threeballot, Vav, and Twin. In: EVT 2007: Proceedings of the USENIX/Accurate Electronic Voting Technology on USENIX/Accurate Electronic Voting Technology Workshop. USENIX Association (2007)
Tarnovsky, C.: Hacking the Smartcard Chip. A presentation at Black Hat DC (2010), http://www.blackhat.com/html/bh-dc-10/bh-dc-10-briefings.html
Weber, S., Araujo, R., Buchmann, J.: On Coercion-Resistant Electronic Elections with Linear Work. In: ARES, Proceedings of the 2nd International Conference on Availability, Reliability and Security, pp. 908–916. IEEE Computer Society, Los Alamitos (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Krzywiecki, Ł., Kutyłowski, M. (2010). Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-13869-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13868-3
Online ISBN: 978-3-642-13869-0
eBook Packages: Computer ScienceComputer Science (R0)