Public Evidence from Secret Ballots

被引:25
作者
Bernhard, Matthew [2 ]
Benaloh, Josh [1 ]
Halderman, J. Alex [2 ]
Rivest, Ronald L. [8 ]
Ryan, Peter Y. A. [3 ]
Stark, Philip B. [4 ]
Teague, Vanessa [6 ]
Vora, Poorvi L. [7 ]
Wallach, Dan S. [5 ]
机构
[1] Microsoft Res, Redmond, WA USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
[3] Univ Luxembourg, Luxembourg, Luxembourg
[4] Univ Calif Berkeley, Berkeley, CA 94720 USA
[5] Rice Univ, Houston, TX USA
[6] Univ Melbourne, Melbourne, Vic, Australia
[7] George Washington Univ, Washington, DC USA
[8] MIT, Cambridge, MA 02139 USA
来源
ELECTRONIC VOTING (E-VOTE-ID 2017) | 2017年 / 10615卷
基金
美国国家科学基金会;
关键词
ELECTION VERIFIABILITY; INDEPENDENCE; PROTOCOLS;
D O I
10.1007/978-3-319-68687-5_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elections seem simple-aren't they just about counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. They also have practical constraints: time is of the essence, and voting systems need to be affordable and maintainable, as well as usable by voters, election officials, and pollworkers. It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics. Election integrity involves two key concepts: convincing evidence that outcomes are correct and privacy, which amounts to convincing assurance that there is no evidence about how any given person voted. These are obviously in tension. We examine how current systems walk this tightrope.
引用
收藏
页码:84 / 109
页数:26
相关论文
共 93 条
  • [1] Adida B., 2006, ACM WORKSH PRIV EL S
  • [2] Adida B., 2008, 17 USENIX SEC S AUG
  • [3] Adida B., 2008, IACR CRYPTOLOGY EPRI, V2008
  • [4] Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting
    Alwen, Joel
    Ostrovsky, Rafail
    Zhou, Hong-Sheng
    Zikas, Vassilis
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 763 - 780
  • [5] [Anonymous], 2013, ACNS
  • [6] [Anonymous], 2006, THESIS
  • [7] Bayer S, 2012, LECT NOTES COMPUT SC, V7237, P263, DOI 10.1007/978-3-642-29011-4_17
  • [8] Bell S., 2013, USENIX J ELECTION TE, V1, P8
  • [9] Ben-Nun J., 2012, 5 INT C EL VOT
  • [10] Benaloh J., 2011, P USENIX ACC EL VOT