Page 123 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 123

Unconditionally Secure Electronic Voting
                                                                                            115
                          Recover:Let A ∈A be the set of players trying to recover a secret. Now they have
                          a set of encrypted shares {s j (x) | j ∈ A}. To recover a secret, simply compute
                          the interpolate the secret from the decrypted shares {s j (0) − R j (0) | j ∈ A}.
                          PubVerify : Verifier k will accept (or reject) the encrypted share s j (x)with the
                          commitment α if the following conditions satisfied:
                                               = F 1 (v k ,y)| y=j + αF 2 (v k ,y)| y=j + R j (v k )
                                      s j (x)| x=v k
                          Theorem 3. The above protocol is a US-PVSS satisfying perfect-completeness,
                           -soundness and perfect-secrecy. Moreover, if the above protocol is constructed over
                          GF(q) and the number of public verifiers is upper-bounded by L, then the success
                          probability for all adversary to break the soundness property is at most L/q.
                          Proof. Completeness is obvious. Since if the dealer is honest, all honest Verifier k
                          accept all encrypted shares in PubVerify with probability 1.
                            To prove soundness, let A, B ∈A be the set of players which outputs different
                          value: Recover({D i (S i ) | i ∈ A})  = Recover({D i (S i ) | i ∈ B}). Then there exists
                          at least 1 share S i where i ∈ A ∪ B such that S i is invalid, thus S i  = F 1 (x, i)+
                          αF 2 (x, i)+ R i (x), and there exists at least 1 honest verifier k ∈{1,... ,L} who
                          accepts the invalid encrypted share S i . From integrity (Lemma 1) and unanimity
                          (Corollary 1), the probability that this situation happen is less than L/q.This
                          probability is exponentially small with the security parameter |q|.
                            Secrecy is also trivial from the secrecy property of the underlying Shamir’s
                          polynomial-based secret sharing scheme and the secrecy property of US-OPE.

                          4   Unconditionally Secure Electronic Voting

                          4.1  Model
                          We follow the bulletin board model for electronic voting as introduced by Be-
                          naloh et al. [8,2]. The model assumes public bulletin board with which every
                          player can post their message to it. Players are comprised of a set of tallying
                          authorities, a set of voters Voter, and a set of passive public verifiers. An election
                          proceeds in two phases. The first phase is the voting phase. In this phase, each
                          voter posts his ballot to the bulletin board. Each ballot consists of encrypted
                          shares of his vote, its commitment to prove the consistency of the shares and a
                          proof that the ballot contains 0 or 1 in the two-value vote. Since the voters need
                          not be anonymous in this scheme, it is trivial to prevent double voting. Only
                          valid ballots will be accepted. The second phase is the tallying phase. In this
                          phase, tallying authorities are involved. They will check each ballot posted on
                          the bulletin board. Then, they decrypt and sum up the shares, like multiparty
                          computation, and post each sum! of the shares.
                            The property required to voting schemes is informally stated as follows.
                           – Eligibility
                             Ensures every eligible voter posts at most one ballot.
                           – Privacy
                             Ensures the secrecy of the contents of ballots.
   118   119   120   121   122   123   124   125   126   127   128