29
Electronic Voting in the Standard Model Semesterarbeit SS03 Thomas Briner Betreuung: Martin Hirt Vote v Voter Authority

Electronic Voting in the Standard Model

Embed Size (px)

DESCRIPTION

Electronic Voting in the Standard Model Thomas Briner September 2003 Electronic voting schemes that claim to satisfy the property of receipt-freeness usually need strong physical assumptions which are not available in real life. In this paper we present a protocol that achieves receipt-freeness in a threshold model without unrealistic assumptions. It is designed for large scale votes. It uses an existing type of untappable channels for the initialization of a vote but only usual internet connections for the voting phase. The untappable channels are needed only in order to achieve receipt-freeness but are not mandatory for all other properties. The protocol achieves receipt-freeness by allowing each voter to convince a votebuyer who is willing to pay for a certain vote even though the voter casted an arbitrary vote. Even if the votebuyer is able to eavesdrop all channels between voters and authorities except for the untappable ones, it is indistinguishable for him whether or not the voter is telling the truth. In case of coercion, a voter who is forced to cast a certain vote is still able to make sure that the vote will be considered invalid and therefore ignored by the authorities without giving the coercer the opportunity to figure it out. All these properties hold under the assumption that no authority cooperates with a votebuyer or blackmailer. A dishonest authority is able to prevent a voter from casting a vote. This cannot be prevented but at least it will be detected that some irregularity has occurred. It is possible that the correctness of the result can be influenced by dishonest authorities, but in a context of a large scale vote, the level of overall correctness can still be judged by detecting the number of such irregularities and comparing it to the result. Universal verifiability is not achieved with this protocol. The protocol is based on a threshold on the number of honest authorities. This is no loss compared to the protocols that claim to have the property of universal verifiability in theory as they need additional elements e.g. a kind of bulletin board that do not exist in real life. To implement this bulletin board it has to be simulated by the authorities and therefore depends on the honesty of those authorities too.

Citation preview

Page 1: Electronic Voting in the Standard Model

Electronic Voting in the Standard Model

SemesterarbeitSS03

Thomas Briner Betreuung: Martin Hirt

Vote v

Voter Authority

Page 2: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 3: Electronic Voting in the Standard Model

Homomorphic Encryption

E(v1) ⊕ E(v

2) = E(v

1+ v

2)

Page 4: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 5: Electronic Voting in the Standard Model

Bulletin Board

SKA

Page 6: Electronic Voting in the Standard Model

Bulletin Board

SKA

randomness

Page 7: Electronic Voting in the Standard Model

Bulletin Board

1,...,T

N)

Page 8: Electronic Voting in the Standard Model

Bulletin Board

1,...,T

N)

Page 9: Electronic Voting in the Standard Model

e = E(v,α)

homomorphicencryption

vblinding

ē

Page 10: Electronic Voting in the Standard Model

SKA

Page 11: Electronic Voting in the Standard Model

ē ē

Page 12: Electronic Voting in the Standard Model

ē ē

Page 13: Electronic Voting in the Standard Model

homomorphicencryption

v

blinding

ē

0 1 0 0 0 0 0

Cand 1 Cand LCand 2 .....

e E(0) E(1) E(0) E(0) E(0) E(0) E(0)

E(0) E(0) E(0) E(0) E(0) E(1) E(0)

Page 14: Electronic Voting in the Standard Model

homomorphic encryptionv

blinding with correct key

ē

e

casted vote

encrypted and blinded voteas sent in ballot

Page 15: Electronic Voting in the Standard Model

homomorphic encryptionv

blinding with correct key

ē

e

v'

e'

casted vote

homomorphic encryption

blinding with fake key

claimed vote

encrypted and blinded voteas sent in ballot

Page 16: Electronic Voting in the Standard Model

ē

casted voteclaimed vote

Page 17: Electronic Voting in the Standard Model
Page 18: Electronic Voting in the Standard Model
Page 19: Electronic Voting in the Standard Model

ballot = (voter ID,vote ID,encrypted and permuted vote ,ēvalidity proof,tag,signature )

Page 20: Electronic Voting in the Standard Model

encrypted permuted vote ē

tag

T

key = ax + b

P

permutation π

Page 21: Electronic Voting in the Standard Model

encrypted permuted vote ē

tag

T'

key = ax + b

P

permutation π

permutation π'

P

tag

T

Page 22: Electronic Voting in the Standard Model

key = ax + b

encrypted permuted vote , permutation ē π

tag

T

encrypted permuted vote , permutation ē π '

tag

T

claimed keys

Page 23: Electronic Voting in the Standard Model

Possible States for each Voter

empty: No correctly signed ballot invalid: One or more correctly signed but

only invalid ones valid: Exactly one correctly signed and valid double: More than one correctly signed and

valid ones

Page 24: Electronic Voting in the Standard Model

List of Accusations

Page 25: Electronic Voting in the Standard Model

The Voter's View

� Receives letter with a permutation and a key

� Chooses his vote

� Encrypts his vote

� Permutes the encrypted vote

� Sends it to at least one honest authority

� Generates fake keys for each permutation he wants to claim

� “Proves” to the votebuyer that he has casted the desired vote

Page 26: Electronic Voting in the Standard Model

Properties of this Protocol

Privacy: Yes!Availability: Yes!Correctness: Not completely,

detection of irregularities but no prevention

Receipt-freeness:Yes!

Page 27: Electronic Voting in the Standard Model

E PK A

(v)

Page 28: Electronic Voting in the Standard Model

E PK A

(v)

Page 29: Electronic Voting in the Standard Model

Vielen Dank für die Aufmerksamkeit!