CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device

نویسندگان

چکیده

Abstract Numerous approaches for cast-as-intended verifiability have been proposed in the literature on electronic voting, balancing practical aspects and security guarantees different ways. One of well-established methods involves use a second device that allows voters to audit their submitted ballots. This approach offers several benefits, including support flexible ballot election types an intuitive user experience. Moreover, solutions based this are generally adaptable range existing voting protocols, rather than being restricted particular scheme. has successfully implemented real-life elections, such as Estonia [18]. In work, we improve device. We propose solution preserves advantageous properties outlined above, while providing stronger guarantees. Our method does not increase risk vote selling compared underlying protocol be augmented, it requires only comparatively weak trust assumptions achieve this. It can combined with various commitment-based systems provide everlasting privacy. Overall, our work new option strengthen end-to-end real-world Internet elections.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Universal Cast-as-Intended Verifiability

In electronic voting, we say that a protocol has cast-asintended verifiability if the contents of each encrypted vote can be audited in order to ensure that they match the voter’s selections. It is traditionally thought that this verification can only be performed by the voter who casts the vote, since only she knows the content of her vote. In this work, we show that this is not the case: we p...

متن کامل

A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards

We propose a simple cast-as-intended remote e-voting protocol where the security is based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards and LCD displays, and can perform a limited number of cryptographic operations (like encryption, signing, and random number generation). The protocol, while very simple, is significantly more secure (in the sense of “c...

متن کامل

Cast-as-Intended Verification in Norway

The Norwegian Ministry started an initiative to implement Internetvoting trials during the municipal elections in 2011. One of the security requirements of the chosen e-voting system to not to put any trust in the voting client: a malicious application controlling the voting client should not be able to modify the voting options selected by the voter without being detected. This paper describes...

متن کامل

Cast-as-Intended Mechanism with Return Codes Based on PETs

We propose a method providing cast-as-intended verifiability for remote electronic voting. The method is based on plaintext equivalence tests (PETs), used to match the cast ballots against the pregenerated encrypted code tables. Our solution provides an attractive balance of security and functional properties. It is based on well-known cryptographic building blocks and relies on standard crypto...

متن کامل

the significance of conjunction as a cohesive device in teaching writing

the research questions were as follows: 1. is there any relationship between the students concious awareness of the form and implications of the conjuncations and their improvement in using appropriate conjunctions? 2. does students knowledge of the from and the implications of the conjunctions help them to produce more coherent writings. 3. does a comparison between english conjunctions and th...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-43756-4_8