Page 125 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 125

Unconditionally Secure Electronic Voting
                                                                                            117
                           3. Integrity:
                                                      be two public verifieres with private information
                             Let Verifier k 1
                                         and Verifier k 2
                                         respectively. Given all information on the Bulletin Board {E ij }
                                 and Z k 2
                             Z k 1
                             and given the outputs of all tallying authorities {S j }, for every choice of
                                                                         outputs the different final
                             k 1 ,k 2 , the probability that Verifier k 1  and Verifier k 2
                             tally islessthan  . That is, for every k 1 , k 2 ∈{1,...,L},there exists  > 0
                             such that

                              Pr [S  = S ; S ← Verifier k 1  ({E ij }, {S j }),S ←Verifier k 2 ({E ij }, {S j })] ≤ ,
                                                                               as final tally. Note
                             where S and S are outputs of Verifier k 1  and Verifier k 2
                             that S ,S ∈ Z ∪{⊥}.


                                Further, if there exists a Verifier k who output a final tally S, then there
                             exists a list of voters V = {i 1 ,i 2,...,i M  }⊆ {1,...,M} whose casted votes
                             are valid and hence counted, and then S satisfies the following relation:

                                                          S =    s i
                                                              i∈V
                             where s i is the value of Voter i ’s vote.
                          For the privacy property of electronic voting schemes, one may notice that the
                          collusion of voters is not consdered in the definition. This is mainly because,
                          in the extreme case, it is trivial that every voter except for a targeted voter is
                          corrupted, then the content of the targeted voter’s vote is revealed from the final
                          tally and the choice of corrupted voters’ votes. In the other words, the level of
                          privacy highly depends on the number of honest voters. Thus, we excluded the
                          corruption of voters from the privacy definition. The construction proposed later
                          in this paper is actually robust against the corruption of fairly large portion of
                          voters only if there exists enough number of honest voters.

                          4.2  Parameters
                          In the following, we will use the parameters listed below.
                             L : number of public verifiers
                            M : number of eligible voters
                             m : number of participating voters (m ≤ M)
                             N : number of authorities
                             T : maximum number of malicious verifiers
                             t : maximum number of malicious authorities
                          4.3  Construction

                          A construction of electronic voting scheme based on bulletin board model [8,2] is
                          given in the information theoretic model. Our construction is based on US-OPE
                          and US-PVSS described in the previous section. The construction is separated 4
                          phases: (1) description of private keys, (2) Voting Phase, (3) Verification Phase,
                          (4) Tallying Phase.
   120   121   122   123   124   125   126   127   128   129   130