[en] Code voting is a technique used to address the secure platform
problem of remote voting. A code voting system consists in secretly
sending, e.g. by mail, code sheets to voters that map their choices to entry
codes in their ballot. While voting, the voter uses the code sheet to
know what code to enter in order to vote for a particular candidate. In
effect, the voter does the vote encryption and, since no malicious software
on the PC has access to the code sheet it is not able to change the voter’s
intention. However, without compromising the voter’s privacy, the vote
codes are not enough to prove that the vote is recorded and counted as
cast by the election server.
We present a voter verifiable code voting solution which, without revealing
the voter’s vote, allows the voter to verify, at the end of the
election, that her vote was cast and counted as intended by just performing
the match of a few small strings. Moreover, w.r.t. a general code
voting system, our solution comes with only a minor change in the voting
interaction.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
JOAQUIM, Rui ; Inesc-ID and Instituto Politécnico de Lisboa - IPL > GSD and Instituto Superior de Engenharia de Lisboa - ISEL
Ribeiro, Carlos; Inesc-ID and Universidade Técnica de Lisboa - UTL > GSD and Instituto Superior Técnico - IST
Ferreira, Paulo; Inesc-ID and Universidade Técnica de Lisboa - UTL > GSD and Instituto Superior Técnico - IST
Rivest, R.L.: Electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 243-268. Springer, Heidelberg (2001)
Chaum, D.: Surevote. International patent WO 01/55940 A1 (2001), http://www.surevote.com/home.html
Oppliger, R.: How to address the secure platform problem for remote internet voting. In: Erasim, E., Karagiannis, D. (eds.) 5th Conference on Sicherheit in Informationssystemen (SIS 2002), pp. 153-173. vdf Hochschulverlag, Vienna (2002)
Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems prespective. In: 14th USENIX Security Symposium, pp. 33-50 (2005)
Neff, A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.com/old/vhti/documentation/vsv-2.0.3638.pdf
UK's Electoral Commission: Technical report on the may 2003 pilots (2003), http://www.electoralcommission.org.uk/about-us/03pilotscheme.cfm
UK's National Technical Authority for Information Assurance: e-voting security study (2002), http://www.ictparliament.org/CDTunisi/ict-compendium/ paesi/uk/uk54.pdf
Helbach, J., Schwenk, J.: Secure internet voting with code sheets. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 166-177. Springer, Heidelberg (2007)
Oppliger, R., Schwenk, J., Helbach, J.: Protecting code voting against vote selling. In: An Analytical Description of CHILL, the CCITT High Level Language. LNI, vol. 128, pp. 193-204. GI (2008)
Helbach, J., Schwenk, J., Schage, S.: Code voting with linkable group signatures. In: EVOTE 2008 (2008)
Joaquim, R., Ribeiro, C.: Codevoting protection against automatic vote manipulation in an uncontrolled environment. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 178-188. Springer, Heidelberg (2007)
ElGamal, T.: A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4), 469-472 (1985)
Cramer, R., Damgard, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997)
Estonian National Electoral Commitee: Internet voting in estonia (2007), http://www.vvk.ee/engindex.html
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-88 (1981)
Neff, C.A.: Verifiable mixing (shuffling) of elgamal pairs (2004)
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
Jakobsson, M., Juels, A., Rivest, R.: Making mix nets robust for electronic voting by randomized partial checking. In: 2002 USENIX Security Symposium, San Francisco, CA, USA, pp. 339-353 (2002)
Adida, B.: Advances in Cryptographic Voting Systems, PhD thesis. MIT (2006)
Gogolewski, M., Klonowski, M., Kubiak, P., Kutylowski, M., Lauks, A., Zagórski, F.: Kleptographic attacks on e-election schemes with receipts. In: Müller, G. (ed.) TRICS 2006. LNCS, vol. 3995, pp. 494-508. Springer, Heidelberg (2006)
Volkamer, M., Grimm, R.: Multiple casts in online voting: Analyzing chances. In: Robert Krimmer, R. (ed.) Electronic Voting 2006, Castle Hofen, Bregenz, Austria, GI. LNI, vol. P-86, pp. 97-106 (2006)