[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Remote Electronic Voting with Revocable Anonymity

  • Conference paper
Information Systems Security (ICISS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5905))

Included in the following conference series:

Abstract

We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea of revocable anonymity in electronic voting, on the grounds of it being a legal requirement in the United Kingdom, and show a method of proving the validity of a ballot to a verifier in zero knowledge, by extension of known two-candidate proofs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Elections (Extended Abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, Montreal, pp. 544–553. ACM, New York (1994)

    Chapter  Google Scholar 

  2. Blackburn, R.: The Electoral System in Britain. Macmillan, London (1995)

    Google Scholar 

  3. Boneh, D., Golle, P.: Almost Entirely Correct Mixing with Applications to Voting. In: Proceedings of the ACM Conference on Computer and Communications Security, Washington DC, pp. 68–77. ACM, New York (2002)

    Google Scholar 

  4. Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical, Voter-verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Chaum, D., van de Graaf, J., Ryan, P.Y.A., Vora, P.L.: High Integrity Elections. Cryptology ePrint Archive, Report 2007/270 (2007), http://eprint.iacr.org/

  6. Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a Secure Voting System. In: Proceedings, 2008 IEEE Symposium on Security and Privacy, pp. 354–368. IEEE, Los Alamitos (2008)

    Google Scholar 

  7. Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-Authority Secret-Ballot Elections with Linear Work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)

    Google Scholar 

  8. Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)

    Google Scholar 

  9. Fan, C.-I., Sun, W.-Z.: An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Mathematical and Computer Modelling 48, 1611–1627 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  10. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    Google Scholar 

  11. Hirt, M.: Multi-Party Computation: Efficient Protocols, General Adversaries and Voting. PhD thesis, ETH Zurich (2001)

    Google Scholar 

  12. Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust for Electronic Voting by Randomised Partial Checking. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, pp. 339–353. USENIX Assoc. (2002)

    Google Scholar 

  14. Jakobsson, M., M’Raihi, D., Tsiounis, Y., Yung, M.: Electronic Payments: Where Do We Go From Here? In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 43–63. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  15. Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money (Extended Abstract). In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 76–87. ACM Press, New York (1996)

    Chapter  Google Scholar 

  16. Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: WPES 2005: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70. ACM, New York (2005)

    Chapter  Google Scholar 

  17. Kügler, D., Vogt, H.: Off-line Payments with Auditable Tracing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Lee, B., Boyd, C., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in mixnet-based voting protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 245–258. Springer, Heidelberg (2004)

    Google Scholar 

  19. Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  20. Rivest, R., Smith, W.: Three Voting Protocols: ThreeBallot, VAV, and Twin. In: Proceedings of Electronic Voting Technology Workshop, 2007, Boston, MA, pp. 1–14 (2007)

    Google Scholar 

  21. Ryan, P.Y.A.: Prêt à Voter With a Human-Readable, Paper Audit Trail. Technical Report CS-TR: 1038, Newcastle University (2007)

    Google Scholar 

  22. Ryan, P.Y.A., Schneider, S.A.: Prêt à Voter with re-encryption mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 313–326. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  23. Saeednia, S., Kremer, S., Markowitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)

    Google Scholar 

  24. Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme: A practical solution to the implementation of a voting booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)

    Google Scholar 

  25. Smart, M., Ritter, E.: Remote Electronic Voting with Revocable Anonymity. Technical Report CSR-09-06, School of Computer Science, University of Birmingham (2009), ftp://ftp.cs.bham.ac.uk/pub/tech-reports/2009/CSR-09-06.pdf

  26. Stewart, J.: A Banana Republic? The Investigation into Electoral Fraud by the Birmingham Election Court. Parliamentary Affairs 59(4), 654–667 (2006)

    Article  Google Scholar 

  27. Volkamer, M., Krimmer, R.: Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. In: Proceedings, First International Conference on Availability, Reliability and Security, ARES 2006, Vienna, pp. 340–347. IEEE, Los Alamitos (2006)

    Chapter  Google Scholar 

  28. Weber, S.G., Araújo, R., Buchmann, J.: On Coercion-Resistant Electronic Elections with Linear Work. In: Proceedings, 2007 2nd International Conference on Availability, Reliability and Security, Vienna, pp. 908–916. IEEE, Los Alamitos (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smart, M., Ritter, E. (2009). Remote Electronic Voting with Revocable Anonymity. In: Prakash, A., Sen Gupta, I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10772-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10772-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10771-9

  • Online ISBN: 978-3-642-10772-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics