Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

VERICONDOR : End-to-end verifiable condorcet voting without tallying authorities

Tools
- Tools
+ Tools

Harrison, Luke, Bag, Samiran, Luo, Hang and Hao, Feng (2022) VERICONDOR : End-to-end verifiable condorcet voting without tallying authorities. In: 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), Nagasaki, Japan ; Virtual, 30 May –3 Jun 2022. Published in: ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security pp. 1113-1125. doi:10.1145/3488932.3497758

[img]
Preview
PDF
WRAP-VERICONDOR-End-to-end-verifiable-condorcet-voting-tallying-authorities-2022.pdf - Accepted Version - Requires a PDF viewer.

Download (849Kb) | Preview
Official URL: https://doi.org/10.1145/3488932.3497758

Request Changes to record.

Abstract

Condorcet voting, first proposed by Marquis de Condorcet in the 18th century, chooses a winner of an election as one that defeats every other candidate by a simple majority. According to Condorcet's criterion, a Condorcet winner is the socially optimal choice in a multi-candidate election. However, despite the crucial importance of this voting system in social-choice theory, it has not been widely used in practical applications. This is partly due to the complex tallying procedure, and also the fact that several candidates may form a tie. Existing systems that provide online Condorcet voting services in the real world try to speed up the tallying process by collecting and tallying Condorcet ballots in a digital form. However, they require voters to completely trust the server. In this paper, we propose VERICONDO, the first end-to-end verifiable Condorcet e-voting system without any tallying authorities. Our system allows a voter to fully verify the tallying integrity without involving any trustworthy tallying authorities and provides strong protection of the ballot secrecy. One main challenge in our work lies in proving the well-formedness of an encrypted ballot while being able to tally the ballots in a publicly verifiable yet privacy-preserving manner. We overcome this challenge by adopting a pairwise comparison matrix and applying a novel vector-sum technique to achieve exceptional efficiency. The overall computational cost per ballot is O (n2) where n is the number of candidates. This is probably the best that one may hope for given the use of a n x n matrix to record a Condorcet ballot. In case of a tie, we show how to apply known Condorcet methods to break the tie in a publicly verifiable manner. Finally, we present a prototype implementation and benchmark performance to show the feasibility of our system.

Item Type: Conference Item (Paper)
Subjects: J Political Science > JF Political institutions (General)
Divisions: Faculty of Science, Engineering and Medicine > Science > Computer Science
Library of Congress Subject Headings (LCSH): Voting -- Security measures, Voting -- Technological innovations, Electronic voting -- Security measures, Electronic voting -- Technological innovations, Election security, Political participation -- Computer network resources
Journal or Publication Title: ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Official Date: 30 May 2022
Dates:
DateEvent
30 May 2022Published
19 October 2021Accepted
Page Range: pp. 1113-1125
DOI: 10.1145/3488932.3497758
Status: Peer Reviewed
Publication Status: Published
Reuse Statement (publisher, data, author rights): "© ACM, 2022 This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 30 May 2022 http://doi.acm.org/10.1145/3488932.3497758
Access rights to Published version: Restricted or Subscription Access
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
Studentship 2436418[EPSRC] Engineering and Physical Sciences Research Councilhttp://dx.doi.org/10.13039/501100000266
ICA\R1\180226Royal Societyhttp://dx.doi.org/10.13039/501100000288
EP/T014784/1[EPSRC] Engineering and Physical Sciences Research Councilhttp://dx.doi.org/10.13039/501100000266
Conference Paper Type: Paper
Title of Event: 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)
Type of Event: Conference
Location of Event: Nagasaki, Japan ; Virtual
Date(s) of Event: 30 May –3 Jun 2022
Related URLs:
  • Organisation
  • Organisation

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us