Transcript
Page 1: Electronic Voting in the Standard Model

Electronic Voting in the Standard Model

SemesterarbeitSS03

Thomas Briner Betreuung: Martin Hirt

Vote v

Voter Authority

Page 2: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 3: Electronic Voting in the Standard Model

Homomorphic Encryption

E(v1) ⊕ E(v

2) = E(v

1+ v

2)

Page 4: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 5: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 6: Electronic Voting in the Standard Model

Bulletin Board

SKA

randomness

Page 7: Electronic Voting in the Standard Model

Bulletin Board

1,...,T

N)

Page 8: Electronic Voting in the Standard Model

Bulletin Board

1,...,T

N)

Page 9: Electronic Voting in the Standard Model

e = E(v,α)

homomorphicencryption

vblinding

ē

Page 10: Electronic Voting in the Standard Model

SKA

Page 11: Electronic Voting in the Standard Model

ē ē

Page 12: Electronic Voting in the Standard Model

ē ē

Page 13: Electronic Voting in the Standard Model

homomorphicencryption

v

blinding

ē

0 1 0 0 0 0 0

Cand 1 Cand LCand 2 .....

e E(0) E(1) E(0) E(0) E(0) E(0) E(0)

E(0) E(0) E(0) E(0) E(0) E(1) E(0)

Page 14: Electronic Voting in the Standard Model

homomorphic encryptionv

blinding with correct key

ē

e

casted vote

encrypted and blinded voteas sent in ballot

Page 15: Electronic Voting in the Standard Model

homomorphic encryptionv

blinding with correct key

ē

e

v'

e'

casted vote

homomorphic encryption

blinding with fake key

claimed vote

encrypted and blinded voteas sent in ballot

Page 16: Electronic Voting in the Standard Model

ē

casted voteclaimed vote

Page 17: Electronic Voting in the Standard Model
Page 18: Electronic Voting in the Standard Model
Page 19: Electronic Voting in the Standard Model

ballot = (voter ID,vote ID,encrypted and permuted vote ,ēvalidity proof,tag,signature )

Page 20: Electronic Voting in the Standard Model

encrypted permuted vote ē

tag

T

key = ax + b

P

permutation π

Page 21: Electronic Voting in the Standard Model

encrypted permuted vote ē

tag

T'

key = ax + b

P

permutation π

permutation π'

P

tag

T

Page 22: Electronic Voting in the Standard Model

key = ax + b

encrypted permuted vote , permutation ē π

tag

T

encrypted permuted vote , permutation ē π '

tag

T

claimed keys

Page 23: Electronic Voting in the Standard Model

Possible States for each Voter

empty: No correctly signed ballot invalid: One or more correctly signed but

only invalid ones valid: Exactly one correctly signed and valid double: More than one correctly signed and

valid ones

Page 24: Electronic Voting in the Standard Model

List of Accusations

Page 25: Electronic Voting in the Standard Model

The Voter's View

� Receives letter with a permutation and a key

� Chooses his vote

� Encrypts his vote

� Permutes the encrypted vote

� Sends it to at least one honest authority

� Generates fake keys for each permutation he wants to claim

� “Proves” to the votebuyer that he has casted the desired vote

Page 26: Electronic Voting in the Standard Model

Properties of this Protocol

Privacy: Yes!Availability: Yes!Correctness: Not completely,

detection of irregularities but no prevention

Receipt-freeness:Yes!

Page 27: Electronic Voting in the Standard Model

E PK A

(v)

Page 28: Electronic Voting in the Standard Model

E PK A

(v)

Page 29: Electronic Voting in the Standard Model

Vielen Dank für die Aufmerksamkeit!


Recommended