Efficient Vote Authorization in Coercion-Resistant Internet Voting
نویسندگان
چکیده
Some years ago, Juels et al. introduced the first coercion-resistant Internet voting protocol. Its basic concept is still the most viable approach to address voter coercion and vote selling in Internet voting. However, one of the main open issues is its unrealistic computational requirements of the quadratic-time tallying procedure. In this paper, we examine the cause of this issue, namely the authorization of votes, and summarize the most recent proposals to perform this step in linear time. We explain the key underlying concepts of these proposals and introduce a new protocol based on anonymity sets. The size of these anonymity sets serves as an adjustable security parameter, which determines the degree of coercion-resistance. The main advantage of the new protocol is to move computational complexity introduced in recent works from the voter side to the tallying authority side.
منابع مشابه
Coercion-Resistant Electronic Elections with Observer
We introduce an electronic election scheme, that is coercion-resistant, a notion introduced by Juels et al. in [JCJ05]. In our scheme we encrypt the credentials that serve as an authorisation to vote during registration. By using a MIX-cascade we can omit one time-consuming plaintext equivalence test in the tallying. In addition, the observer facilitates registration and voting for the benefit ...
متن کاملScroll, Match & Vote: An E2E Coercion Resistant Mobile Voting System
Mobile Internet Elections are appealing for several reasons; they promise voter convenience, lower abstention rates and lower costs. However, there are a number of trust issues that prevent them from becoming ubiquitous, the most relevant of which is the possibility of coercion of the voter at the time of the vote. But other issues, like the trustworthiness of both the services running the elec...
متن کاملAchieving Meaningful Efficiency in Coercion-Resistant, Verifiable Internet Voting
In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures are put in place to reassure voters that the result of the tally is correct. Considering that in Internet voting errors or fraud will generally scale over a much greater fraction of votes, the demand to get strong reassurances as well, seems more than justified. With the ambition of offering a maximum degre...
متن کاملSelections: Internet Voting with Over-the-Shoulder Coercion-Resistance
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. We say a system provides over-the-shoulder coercionresistance if a voter can undetectably avoid complying with an adversary that is present during the vote casting process....
متن کاملSecure Internet Voting on Limited Devices with Anonymized DSA Public Keys
This paper presents an Internet voting protocol, which is primarily designed for limited voting devices such as smart cards or mobile phones. The minimum requirement for these devices is the ability to compute one ElGamal encryption and one DSA signature in reasonable time. The protocol is based on an anonymization mechanism for DSA public keys, which can be installed on top of an existing DSA ...
متن کامل