Election Verifiability for Helios under Weaker Trust Assumptions
نویسندگان
چکیده
Most electronic voting schemes aim at providing verifiability: voters should trust the result without having to rely on some authorities. Actually, even a prominent voting system like Helios cannot fully achieve verifiability since a dishonest bulletin board may add ballots. This problem is called ballot stuffing. In this paper we give a definition of verifiability in the computational model to account for a malicious bulletin board that may add ballots. Next, we provide a generic construction that transforms a voting scheme that is verifiable against an honest bulletin board and an honest registration authority (weak verifiability) into a verifiable voting scheme under the weaker trust assumption that the registration authority and the bulletin board are not simultaneously dishonest (strong verifiability). This construction simply adds a registration authority that sends private credentials to the voters, and publishes the corresponding public credentials. We further provide simple and natural criteria that imply weak verifiability. As an application of these criteria, we formally prove the latest variant of Helios by Bernhard, Pereira andWarinschi weakly verifiable. By applying our generic construction we obtain a Helios-like scheme that has ballot privacy and strong verifiability (and thus prevents ballot stuffing). The resulting voting scheme, Helios-C, retains the simplicity of Helios and has been implemented and tested. Key-words: voting protocols, individual verifiability, universal verifiability, ballot stuffing, ballot privacy, Helios Des élections plus vérifiables pour Helios, sous des hypothèses de confiance plus faibles Résumé : La plupart des systèmes de vote électroniques cherchent à être vérifiables: les votants devraient pouvoir croire le résultat proclamé sans devoir faire confiance à une autorité particulière. En fait, même un système de vote bien connu comme Helios n’est pas parfaitement vérifiable. En effet, une urne malhonnête pourrait ajouter des bulletins à la place des votants qui se sont abstenus. Ce problème s’appelle le bourrage d’urne. Dans cet article, nous définissons une notion de vérifiabilité qui prend en compte le fait qu’une urne malhonnête pourrait tenter d’ajouter des bulletins. Puis nous proposons une construction générique qui permet de transformer un système de vote vérifiable pour une urne honnête (vérifiabilité faible), en un système de vote vérifiable sous une hypothèse de confiance plus faible: l’autorité d’enregistrement et l’urne ne doivent pas être simultanément corrompues (vérifiabilité forte). Cette construction requière simplement une autorité d’enregistrement supplémentaire qui envoie un "crédit" privé à chaque votant et publie les partie publiques des "crédits". Nous proposons également un critère simple qui assure la vérifiabilité faible. En application de ce critère, nous prouvons formellement que la dernière version d’Helios, par Bernhard, Pereira et Warinschi, est faiblement vérifiable. Puis en appliquant notre construction générique, nous obtenons une variante d’Helios qui garantit à la fois le secret du vote et la vérifiabilité forte (et donc prévient le bourrage d’urne). Le schéma de vote correspondant, Helios-C, conserve la simplicité d’Helios. Il a été implémenté et testé. Mots-clés : protocoles de vote, vérifiabilité individuelle, vérifiabilité universelle, bourrage d’urne, confidentialité des votes, Helios Election Verifiability for Helios under Weaker Trust Assumptions 3
منابع مشابه
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...
متن کاملElection Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...
متن کاملSecurity Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy. However, depending on its version, the scheme provides either participation privacy (hiding who participated in the election) or verifiability against malicious bulletin board (preventing election manipulation by ballot stuffing), but not both at the same time. It also does not provide receipt...
متن کاملComputational Election Verifiability: Definitions and an Analysis of Helios and JCJ
Definitions of election verifiability in the computational model of cryptography are proposed. The definitions formalize notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009) and JCJ (Juels et al., 2010) election schemes are shown to satisfy these definitions. Two previous defini...
متن کاملComputational Election Verifiability: Definitions and an Analysis of Helios and JCJ (Technical Report)
Definitions of election verifiability in the computational model of cryptography are proposed. The definitions formalize notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009) and JCJ (Juels et al., 2010) election schemes are shown to satisfy these definitions. A previous definiti...
متن کامل