Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme

被引:14
作者
Bernhard, David [1 ]
Kulyk, Oksana [2 ]
Volkamer, Melanie [2 ,3 ]
机构
[1] Univ Bristol, Bristol, Avon, England
[2] Tech Univ Darmstadt, Darmstadt, Germany
[3] Karlstad Univ, Karlstad, Sweden
来源
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) | 2017年
关键词
D O I
10.1145/3098954.3098990
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy. However, depending on its version, the scheme provides either participation privacy (hiding who participated in the election) or verifiability against malicious bulletin board (preventing election manipulation by ballot stuffing), but not both at the same time. It also does not provide receipt-freeness, thus enabling vote buying by letting the voters construct receipts proving how they voted. Recently, an extension to Helios, further referred to as KTV-Helios, has been proposed that claims to provide these additional security properties. However, the authors of KTV-Helios did not prove their claims. Our contribution is to provide formal definitions for participation privacy and receipt-freeness that we applied to KTV-Helios. In order to evaluate the fulfillment of participation privacy and receipt-freeness, we furthermore applied the existing definition of ballot privacy, which was also used for evaluating the security of Helios, in order to show that ballot privacy also holds for KTV-Helios.
引用
收藏
页数:10
相关论文
共 47 条
[1]  
Achenbach D., 2015, USENIX J ELECTION TE, V3, P26
[2]  
Adida B., 2008, USENIX, P335
[3]  
Arnaud Mathilde, 2013, E-Voting and Identify. 4th International Conference, Vote-ID 2013. Proceedings: LNCS 7985, P109, DOI 10.1007/978-3-642-39185-9_7
[4]  
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[5]   Automated verification of remote electronic voting protocols in the applied pi-calculus [J].
Backes, Michael ;
Hritcu, Catalin ;
Maffei, Matteo .
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, :195-209
[6]  
Benaloh Josh, 1987, PhD Thesis
[7]  
Benaloh JoshC., 1986, Proceedings of the fifth annual ACM symposium on Principles of distributed computing, P52
[8]   SoK: A comprehensive analysis of game-based ballot privacy definitions [J].
Bernhard, David ;
Cortier, Veronique ;
Galindo, David ;
Pereira, Olivier ;
Warinschi, Bogdan .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :499-516
[9]  
Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
[10]  
Bernhard Melanie Volkamer David, 2017, 2016431 CRYPT EPRINT