Page 117 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 117

Unconditionally Secure Electronic Voting
                                                                                            109
                          cope with more demanding problem of the polling booth scenario where polling
                          machines are not trustworthy. Paper receipt from the polling machines can help
                          voters to verify the integrity of tally via internet, while providing receipt-freeness.
                          But generally speaking, it seems to be hard to design a scheme which satisfies
                          both of the properties unconditionally as far as we base them on cryptographic
                          primitives which must assume computational intractability.
                            Broadbent and Tapp [3] proposed electronic voting scheme which simultane-
                          ously satisfies unconditional secrecy of ballots and unconditional integrity. Their
                          scheme is based on information-theoretic primitives primarily on cut and choose
                          technique and multiparty computation. In their scheme, the integrity of tally
                          totally depends on the trust of authorities, where no one outside of the tallying
                          authorities can verify the integrity. Moreover, if one of the authorities is dishon-
                          est, then the dishonest authority can revoke any ballot from honest voters.
                            Our scheme simultaneously satisfies unconditional secrecy of ballots and uncon-
                          ditional integrity of tally. The integrity of tally is assured through information-
                          theoretic public verifiability, where everyone with private verification key can
                          detect the distorted integrity of the voting results and proved incorrect even if
                          all dishonest voters and tallying authorities have unbounded computing power.
                          If at least one tallying authority is honest, then the privacy of the ballots are pro-
                          tected everlastingly even the other voters and tallying authorities are malicious
                          and have the unbounded computing power.
                            Achieving unconditionally secure receipt-freeness and extending our uncondi-
                          tionally secure scheme to polling booth scenario still remain as open problems.


                          2   Preliminary
                          In this section, we introduce the most simplified version of our information the-
                          oretic tool, hidden point evaluation technique. The setting taken in this paper
                          is as follows. Each player is given some predistributed information described be-
                          low so that each player has an information theoretic advantage over the other
                          players. Our aim is to construct more complicated protocols like electronic vot-
                          ing using only this predistributed information, thus without depending on any
                          computational assumption.
                            Suppose we have a prover P and verifiers V 1 ,...,V n , all of them are proba-
                          bilistic polynomial-time algorithms. Let q be a prime power, and let F be a set
                          of all univariate polynomials in GF(q)[x].
                            For some polynomial f 0 ∈F of degree ω chosen randomly and uniformly. The
                          prover is given the polynomial f 0 as is. On the other hand, each verifier V 1 ,... ,V n
                          is given a randomly and uniformly chosen hidden point (x i ,y i ) satisfying y i =
                          f 0 (x i )for i =1,... ,n in a way that each hidden point is only known to the
                          corresponding verifier and that the other players including the prover have no
                          information on which point on y = f 0 (x) is chosen by the verifier.
                            Note that in Shamir’s secret sharing, the dealer(prover) knowing the poly-
                          nomial also knows each share delivered to each shareholder(verifier). However,
                          in our setting, the prover knows the polynomial but has no information on the
   112   113   114   115   116   117   118   119   120   121   122