The Library
DRE-ip : a verifiable e-voting scheme without tallying authorities
Tools
Shahandashti, Siamak F. and Hao, Feng (2016) DRE-ip : a verifiable e-voting scheme without tallying authorities. In: Askoxylakis, I. and Ioannidis, S. and Katsikas, S. and Meadows, C., (eds.) Computer Security – ESORICS 2016. Lecture Notes in Computer Science, 9879 . Springer, pp. 223-240. ISBN 9783319457406
|
PDF
WRAP-DRE-ip-verifiable-e-voting-scheme-without-tallying-authorities-Hao-2016.pdf - Accepted Version - Requires a PDF viewer. Download (674Kb) | Preview |
Official URL: http://dx.doi.org/10.1007/978-3-319-45741-3_12
Abstract
Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the election using random factors that will later cancel out and allow the public to verify the tally after the election. While the removal of tallying authorities significantly simplifies election management, the pre-computation of ballots necessitates secure ballot storage, as leakage of precomputed ballots endangers voter privacy. In this paper, we address this problem and propose DRE-ip (DRE-i with enhanced privacy). Adopting a different design strategy, DRE-ip is able to encrypt ballots in real time in such a way that the election tally can be publicly verified without decrypting the cast ballots. As a result, DRE-ip achieves end-to-end verifiability without tallying authorities, similar to DRE-i, but with a significantly stronger guarantee on voter privacy. In the event that the voting machine is fully compromised, the assurance on tallying integrity remains intact and the information leakage is limited to the minimum: only the partial tally at the time of compromise is leaked.
Item Type: | Book Item | ||||||
---|---|---|---|---|---|---|---|
Subjects: | J Political Science > JF Political institutions (General) Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software |
||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||
Library of Congress Subject Headings (LCSH): | Electronic voting -- Software, Elections | ||||||
Series Name: | Lecture Notes in Computer Science | ||||||
Publisher: | Springer | ||||||
ISBN: | 9783319457406 | ||||||
ISSN: | 0302-9743 | ||||||
Book Title: | Computer Security – ESORICS 2016 | ||||||
Editor: | Askoxylakis, I. and Ioannidis, S. and Katsikas, S. and Meadows, C. | ||||||
Official Date: | 15 September 2016 | ||||||
Dates: |
|
||||||
Volume: | 9879 | ||||||
Page Range: | pp. 223-240 | ||||||
DOI: | 10.1007/978-3-319-45741-3_12 | ||||||
Status: | Peer Reviewed | ||||||
Publication Status: | Published | ||||||
Reuse Statement (publisher, data, author rights): | This is a post-peer-review, pre-copyedit version of an article published in Computer Security – ESORICS 2016. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-319-45741-3_12 | ||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||
Date of first compliant deposit: | 5 December 2018 | ||||||
Date of first compliant Open Access: | 5 December 2018 | ||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year