Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines

被引:3
作者
Murshed, Manzur [1 ]
Sabrina, Tishna [1 ]
Iqbal, Anindya [1 ]
Ali, Mortuza [1 ]
机构
[1] Monash Univ, Gippsland Sch Informat Technol, Churchill, Vic 3842, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
electronic voting; privacy; verifiability; coercion resistance; k-anonymity; SECURE; SYSTEM;
D O I
10.1109/TrustCom.2013.97
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing a trustworthy voting system that uses electronic voting machines (EVMs) for efficiency and accuracy is a challenging task. It is difficult, if not impossible, to ensure the trustworthiness of EVMs that possess computation, storage, and communication capabilities. Thus an electronic voting system that does not assume trusted EVMs is clearly desirable. In this paper, we have proposed a k-anonymized electronic voting scheme that achieves this goal by assuming a hardware-controlled trusted random number generator external to the EVM. The proposed scheme relies on a k-anonymization technique to protect privacy and resort to joint de-anonymization of the votes for counting. Since the joint de-anonymization takes into account all the votes, it is difficult to manipulate an individual vote, even by the EVM, without being detected. Besides the anonymization technique, the proposed scheme relies on standard cryptographic hashing and the concept of floating receipt to provide end-to-end verifiability that prevents coercion or vote trading.
引用
收藏
页码:798 / 804
页数:7
相关论文
共 22 条
[1]  
[Anonymous], IEEE SECURITY PRIVAC
[2]  
Bohli JM, 2007, LECT NOTES COMPUT SC, V4896, P111, DOI 10.1007/978-3-540-77493-8_10
[3]   Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes [J].
Chaum, David ;
Carback, Richard T. ;
Clark, Jeremy ;
Essex, Aleksander ;
Popoveniuc, Stefan ;
Rivest, Ronald L. ;
Ryan, Peter Y. A. ;
Shen, Emily ;
Sherman, Alan T. ;
Vora, Poorvi L. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :611-627
[4]   Civitas: Toward a secure voting system [J].
Clarkson, Michael R. ;
Chong, Stephen ;
Myers, Andrew C. .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :354-368
[5]  
Costa R. G., 2008, P IEEE S SEC PRIV S
[6]  
Davtyan S., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, P1486, DOI DOI 10.1145/2245276
[7]  
Demirel D., 2012, P IACR CRYPT EPRINT
[8]  
Dill D. L., 2008, COMMUNICATIONS ACM, V51
[9]  
Dreier J., 2012, P IEEE WORKSH SEC FO
[10]   Electronic Voting [J].
Epstein, Jeremy .
COMPUTER, 2007, 40 (08) :92-95