The Library
VERICONDOR : End-to-end verifiable condorcet voting without tallying authorities
Tools
Harrison, Luke, Bag, Samiran, Luo, Hang and Hao, Feng (2022) VERICONDOR : End-to-end verifiable condorcet voting without tallying authorities. In: 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), Nagasaki, Japan ; Virtual, 30 May –3 Jun 2022. Published in: ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security pp. 1113-1125. doi:10.1145/3488932.3497758
|
PDF
WRAP-VERICONDOR-End-to-end-verifiable-condorcet-voting-tallying-authorities-2022.pdf - Accepted Version - Requires a PDF viewer. Download (849Kb) | Preview |
Official URL: https://doi.org/10.1145/3488932.3497758
Abstract
Condorcet voting, first proposed by Marquis de Condorcet in the 18th century, chooses a winner of an election as one that defeats every other candidate by a simple majority. According to Condorcet's criterion, a Condorcet winner is the socially optimal choice in a multi-candidate election. However, despite the crucial importance of this voting system in social-choice theory, it has not been widely used in practical applications. This is partly due to the complex tallying procedure, and also the fact that several candidates may form a tie. Existing systems that provide online Condorcet voting services in the real world try to speed up the tallying process by collecting and tallying Condorcet ballots in a digital form. However, they require voters to completely trust the server. In this paper, we propose VERICONDO, the first end-to-end verifiable Condorcet e-voting system without any tallying authorities. Our system allows a voter to fully verify the tallying integrity without involving any trustworthy tallying authorities and provides strong protection of the ballot secrecy. One main challenge in our work lies in proving the well-formedness of an encrypted ballot while being able to tally the ballots in a publicly verifiable yet privacy-preserving manner. We overcome this challenge by adopting a pairwise comparison matrix and applying a novel vector-sum technique to achieve exceptional efficiency. The overall computational cost per ballot is O (n2) where n is the number of candidates. This is probably the best that one may hope for given the use of a n x n matrix to record a Condorcet ballot. In case of a tie, we show how to apply known Condorcet methods to break the tie in a publicly verifiable manner. Finally, we present a prototype implementation and benchmark performance to show the feasibility of our system.
Item Type: | Conference Item (Paper) | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | J Political Science > JF Political institutions (General) | ||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||||||
Library of Congress Subject Headings (LCSH): | Voting -- Security measures, Voting -- Technological innovations, Electronic voting -- Security measures, Electronic voting -- Technological innovations, Election security, Political participation -- Computer network resources | ||||||||||||
Journal or Publication Title: | ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security | ||||||||||||
Publisher: | ACM | ||||||||||||
Official Date: | 30 May 2022 | ||||||||||||
Dates: |
|
||||||||||||
Page Range: | pp. 1113-1125 | ||||||||||||
DOI: | 10.1145/3488932.3497758 | ||||||||||||
Status: | Peer Reviewed | ||||||||||||
Publication Status: | Published | ||||||||||||
Reuse Statement (publisher, data, author rights): | "© ACM, 2022 This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 30 May 2022 http://doi.acm.org/10.1145/3488932.3497758 | ||||||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||||||
Date of first compliant deposit: | 6 December 2021 | ||||||||||||
Date of first compliant Open Access: | 6 June 2022 | ||||||||||||
RIOXX Funder/Project Grant: |
|
||||||||||||
Conference Paper Type: | Paper | ||||||||||||
Title of Event: | 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022) | ||||||||||||
Type of Event: | Conference | ||||||||||||
Location of Event: | Nagasaki, Japan ; Virtual | ||||||||||||
Date(s) of Event: | 30 May –3 Jun 2022 | ||||||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year