Page 119 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 119

Unconditionally Secure Electronic Voting
                                                                                            111
                          Definition 2. (Homomorphism) For a polynomial g(x) ∈F generated from a
                          linear combination of polynomials f 1 (x),...,f n (x) ∈F, and for a commitment
                          (a 1 ,...,a n ) generated by the prover, the commitment-polynomial pair (a 1 ,... ,a n )
                          and g(x) is called accepted by a verifier V i , if and only if the following equation
                          is satisfied:
                                                            n

                                                    g(x i )=  a j f j (v i ).
                                                           j=1
                          3   Information Theoretic Primitives
                          3.1  Oblivious Polynomial Evaluation
                          Oblivious polynomial evaluation(OPE) is an extension of the basic primitive,
                          oblivious transfer(OT), first introduced by Naor and Pinkas [16]. OPE is a two
                          party protocol where Alice is given a polynomial f(x) on her private input,
                          and Bob is given a value x 0 on his private input. After executing a protocol,
                          Bob outputs a value y 0 = f(x 0 ) (with negligible error probability) in a way
                          that Alice has no information (or learns negligible amount of information) on
                          the Bob’s input x 0 and that Bob has no more information (or learns negligible
                          information) on the Alice’s private input f(x) than that can be implied from y 0 .

                          Definitions and Bounds. In [13], OPE is formalized in the information theo-
                          retic setting. We restate the definitions and bounds on US-OPE in the following.
                          Definition 3. ( -correct OPE) A OPE protocol π is called  -correct if after
                          executing the protocol π with honest players, there exists   satisfying the following
                          equation:
                                              Pr(y  = y 0 :(⊥,y) ← π(f, x 0 )) ≤
                          where y 0 is the correct output such that y 0 = f(x 0 ).
                          Definition 4. ( -private OPE) Let F, X and Y be the random variables repre-
                          senting the polynomial f on Alice’s private input, the value x 0 on Bob’s private
                          input, and y on Bob’s private output. A OPE protocol π is called  -private for
                          Bob if for any possible behavior of Alice,
                                                     I(View A ; X) ≤

                          where I(·; ·) is Shannon’s mutual information, View A is a random variable which
                          represents Alice’s view after completion of the protocol π, X is a random variable
                          representing Bob’s input x 0 .
                            Similarly, an OPE protocol π is called  -private for Alice if for any possible
                          behavior of Bob, there exists   such that

                                                       I(F; X) ≤  ,

                                                   I(F; View B |XY ) ≤  .
   114   115   116   117   118   119   120   121   122   123   124