Coercion-Resistant Remote Voting using Decryption Mixes

نویسندگان

  • Michael R. Clarkson
  • Andrew C. Myers
چکیده

The recently proposed Prêt à Voter election scheme uses decryption mixes to achieve anonymity of votes and verifiability of an election while requiring minimal trust in the component of the election system that performs these mixes. However, this scheme still requires trust in several human and machine components; these requirements make the scheme impractical for use in remote voting. To adapt the scheme for remote voting, new protocols are proposed that preserve anonymity and verifiability and additionally achieve coercion resistance. The scheme is also extended to allow Condorcet voting methods. An implementation is in progress using Jif, a security-typed language.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme

The secure remote Internet voting protocol play an important role in Internet voting system. The direction of development of remote Internet voting protocol is that implementation of receipt-freeness and coercion-resistance is from with strong physical assumptions to with weak physical assumptions. The final purpose is that receiptfreeness and coercion-resistance is implemented without physical...

متن کامل

Remote e-Voting and Coercion: a Risk-Assessment Model and Solutions

This paper, useful to anyone who has to address the public and representatives of the world of politics, focuses on the specific topic of resistance to vote-coercion. By using a model, we want to illustrate the implicit – and possibly realistic assumption that vote-buying is not profitable or doable in current conditions. But these assumptions do not necessarily hold good in all environments. F...

متن کامل

Robust Coercion-Resistant Registration for Remote E-voting

During the registration phase of remote electronic voting schemes, the voter obtains a credential that proves the validity of her vote later, in the tallying phase. Most of the existing remote coercionresistant schemes either omit the description of the the registration phase or assume the existence of a trusted registering authority that authenticates voters as well as creates and distributes ...

متن کامل

True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing

We present a new remote, coercion-resistant electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce trusted computing as a method of ensuring the trustworthiness of remote voters, and provide an extension to our protocol allowing revocable anonymity, on the grounds of it being a legal requirement in the United Kingdom.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005