An Efficient E2E Crowd Verifiable E-Voting System

被引:3
作者
Zhang, Xinyu [1 ]
Zhang, Bingsheng [1 ]
Kiayias, Aggelos [2 ]
Zacharias, Thomas [2 ]
Ren, Kui [1 ,3 ]
机构
[1] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ Edinburgh, Sch Informat, Edinburgh EH8 9YL, Midlothian, Scotland
[3] Key Lab Blockchain & Cyberspace Governance Zhejia, Hangzhou 310007, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Electronic voting; Privacy; Hash functions; Task analysis; Read only memory; Protocols; End-to-end verifiability; E-voting; subversion-resilient; NIZK; SECURITY;
D O I
10.1109/TDSC.2021.3103336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting (e-voting), compared with article voting, has advantages in several aspects. Among those benefits, the ability to audit the electoral process at every stage is one of the most desired features of an e-voting system. In Eurocrypt 2015, Kiayias, Zacharias, and Zhang proposed a new E2E verifiable e-voting system that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, their system comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to precompute a number of ciphertexts for each voter and each possible choice of the voter. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext. In this work, we construct a new e-voting system that retains similar strong E2E characteristics (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.
引用
收藏
页码:3607 / 3620
页数:14
相关论文
共 26 条
  • [1] A Subversion-Resistant SNARK
    Abdolmaleki, Behzad
    Baghery, Karim
    Lipmaa, Helger
    Zajac, Michal
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 3 - 33
  • [2] Adida B., 2008, P USENIX SEC S, VVolume 17, P335
  • [3] NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
    Bellare, Mihir
    Fuchsbauer, Georg
    Scafuro, Alessandra
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 777 - 804
  • [4] Bellare Mihir, 1993, PROC 1 ACM SIGSAC C, P3
  • [5] Benaloh J., 2006, Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Elec- tronic Voting Technology Workshop, P5
  • [6] Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
  • [7] Bernhard D, 2011, LECT NOTES COMPUT SC, V6879, P335, DOI 10.1007/978-3-642-23822-2_19
  • [8] Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
  • [9] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [10] Security and composition of multiparty cryptographic protocols
    Canetti, R
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202