Page 116 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 116

A. Otsuka and H. Imai
                          108
                          inputs. Then, after jointly executing a protocol, Bob outputs a value of the
                          polynomial evaluated at the value without learning any useful information about
                          the values of their private inputs each other. OPE is first proposed by Naor and
                          Pinkas [16] in the computational setting. In [6], they improved the efficiency of
                          OPE, and also proposed OPE in the information theoretic setting. However, the
                          security of their scheme depends on trustiness of a online trusted party. Our
                          result shows that if private keys are securely distributed to each players, then
                          unconditionally secure is efficiently implementable. The simplest implementation
                          of ou! r protocol requires a trusted party who engages only in the set-up phase
                          (trusted initializer [18]). Thus no online trusted party is required.
                            The other primitive introduced in this paper is information theoretic version
                          of Publicly Verifiable Secret Sharing (PVSS). PVSS is an extension of Verifiable
                          Secret Sharing [7,11] first introduced by Stadler [22] and later improved [12,19].
                          PVSS is a VSS with a property that not only the players but anyone can ver-
                          ify that the secret is shared properly. Interestingly, PVSS is possible under the
                          computationally bounded model or maybe under the storage bounded model,
                          but impossible in the information theoretic model. Since the schemes based on
                          computational assumption can utilize a public verification key to check the con-
                          sistency of the shares in such a way that the adversary cannot cheat a casual
                          user without solving a computational hard problem. However, in the informa-
                          tion theoretic model, it is impossible since the casual user has no information
                          theoretic advantage over the adversary. Thus, we restrict the notion of public
                          verifiability of PVSS to that every user with his own private key can verify the
                          integrity of PVSS. Since every user (including non-voters) is eligible to become a
                          public verifier, this restriction will not cause a major problem in an application
                          to e-voting.


                          1.1  Related Work
                          In electronic voting systems, the following two security properties are considered
                          with special importance [4]:
                                                        1
                           – Secret ballots (Receipt-freeness )
                             Voter must not be able to convince others of how he or she voted.
                           – Unconditional integrity
                             Anyone should not allow incorrect tally (except with negligible probability).
                          Efficient schemes are ever proposed which protects one of the above property
                          unconditionally but the other only computationally. Chaum et al. [5] proposed
                          a scheme achieving unconditional integrity with computational receipt-freeness.
                          Moran and Naor [15] satisfies unconditional receipt-freeness but computational
                          integrity, and Cramer et al. [10] satisfies similar property but only uncondi-
                          tional secrecy of ballots. Chaum’s and Moran’s schemes are further designed to
                          1
                            Secrecy of ballots is defined in many articles as primary property of electronic vot-
                            ing. However, receipt-freeness is strictly stronger than secrecy of ballots as receipt-
                            freeness implies secrecy of ballots. Thus, only receipt-freeness is required here.
   111   112   113   114   115   116   117   118   119   120   121