Skip to main content

An Efficient and Highly Sound Voter Verification Technique and Its Implementation

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7187)

Abstract

This paper presents MarkPledge3 (MP3), the most efficient specification of the MarkPledge (MP) technique. The MP technique allows the voter to verify that her vote is correctly encrypted with a soundness of 1 − 2− α, with 20 ≤ α ≤ 30, just by performing a match of a small string (4-5 characters). Due to its simplicity, verifying the election public data (vote encryptions and tally) in MP3 is 2.6 times faster than with MP2 and the vote encryption creation on devices with low computational power, e.g. smart cards, is approximately 6 times better than the best of the previous MP specifications (MP1 and MP2).

Keywords

  • Verifiability
  • Voter Vote verification
  • MarkPledge

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-32747-6_7
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   39.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-32747-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   54.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adida, B.: Advances in Cryptographic Voting Systems. Ph.D. thesis, MIT (August 2006)

    Google Scholar 

  2. Adida, B.: Helios: Web-based open-audit voting. In: 17th USENIX Security Symposium (2008)

    Google Scholar 

  3. Adida, B., Neff, A.: Ballot casting assurance. In: EVT 2006. USENIX/ACCURATE, Vancouver, B.C. (2006)

    Google Scholar 

  4. Adida, B., Neff, A.: Efficient receipt-free ballot casting resistant to covert channels. In: EVT/WOTE 2009. USENIX/ACCURATE/IAVOSS, Montreal, Canada (August 2009)

    Google Scholar 

  5. Benaloh, J.: Simple verifiable elections. In: EVT 2006. USENIX/ACCURATE, Vancouver, B.C. (2006)

    Google Scholar 

  6. Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: EVT 2007. USENIX/ACCURATE, Boston, MA (2007)

    Google Scholar 

  7. Benaloh, J.C.: Verifiable Secret-Ballot Elections. Ph.D. thesis, Yale University (1987)

    Google Scholar 

  8. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    CrossRef  Google Scholar 

  9. Chaum, D.: Secret-ballot receipts: True voter-verifiable election. IEEE Security & Privacy 02(1), 38–47 (2004)

    CrossRef  Google Scholar 

  10. Chaum, D.: Punchscan (September 2009), http://www.punchscan.org/

  11. Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)

    Google Scholar 

  12. Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  13. Clarkson, M., Chong, S., Myers, A.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354–368 (May 2008)

    Google Scholar 

  14. Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)

    Google Scholar 

  15. ElGamal, T.: A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)

    MathSciNet  CrossRef  Google Scholar 

  16. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    CrossRef  Google Scholar 

  17. Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  18. Joaquim, R., Ribeiro, C.: An efficient and highly sound voter verification technique and its implementation - extended version. Tech. Rep. 40/2011, INESC-ID (September 2011)

    Google Scholar 

  19. Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: A Voter Verifiable Code Voting System. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol. 5767, pp. 106–121. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  20. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: WPES, Alexandria, Virginia, USA, pp. 61–70 (November 2005)

    Google Scholar 

  21. Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006), http://www.seas.harvard.edu/~talm/papers/MN06-voting.pdf

    CrossRef  Google Scholar 

  22. Neff, C.A.: Practical high certainty intent verification for encrypted votes (2004), http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.134.1006&rep=rep1&type=pdf

  23. NIST: Gigital signature standard (dss) (June 2009), http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf , FIPS 186-3

  24. Okamoto, T.: Receipt-free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  25. Sandler, D., Derr, K., Wallach, D.S.: Votebox: A tamper-evident verifiable electronic voting system. In: 16th USENIX Security Symposium (2007)

    Google Scholar 

  26. Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security, pp. 106–110 (2009)

    Google Scholar 

  27. Wikipedia: (April 2011), http://en.wikipedia.org/wiki/Exponentiation_by_squaring#Computation_by_powers_of_2

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Joaquim, R., Ribeiro, C. (2012). An Efficient and Highly Sound Voter Verification Technique and Its Implementation. In: Kiayias, A., Lipmaa, H. (eds) E-Voting and Identity. Vote-ID 2011. Lecture Notes in Computer Science, vol 7187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32747-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32747-6_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32746-9

  • Online ISBN: 978-3-642-32747-6

  • eBook Packages: Computer ScienceComputer Science (R0)