Page 167 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 167

Univ. Verifiability
                                                  Efficient Tallying
                           Approaches
                                                                                    Write-ins
                                                  √
                                                                   √
                           Homomorphic Encryption
                                                                                    ×
                                                                   √
                                                                                    √
                           Mix-networks
                                                  ×
                                                                                    √
                                                  √
                           Blind-Signatures  The Vector-Ballot Approach for Online Voting Procedures  159
                                                                   ×
                                                  √                √                √
                                                   ∗
                           Vector-Ballot approach
                          Fig. 1. A comparison of the current approach to previous work with respect to the
                          following three important e-voting properties: (i) efficient-tallying: tallying does not
                          require the application of a robust-mix to the total number of ballots; in the vector
                                                                                    ∗
                          ballot approach a robust-mix is still required but is applied on a fraction of the to-
                          tal number of ballots and typically as an offline operation. (ii) universal-verifiability:
                          any interested third party may verify that the election protocol is executed correctly
                          assuming a public digital record; (iii) write-ins: voters are allowed to enter write-in
                          votes.
                          traded against a quadratic – rather than linear – (in c) work done for validity
                          checking of ballots; in most settings this would be a reasonable price to pay for
                          such a speedup.
                            A preliminary version of this work appeared in [31].
                          2   Preliminaries
                          Requirements For Voting Schemes. A voting-scheme needs to fulfill a va-
                          riety of requirements. A brief presentation of these requirements follows.
                          Secrecy. Ensures the security of the contents of ballots. In the online setting,
                          this is typically achieved by relying on the honesty of a sufficient number of the
                          participating authorities and at the same time on some cryptographic intractabil-
                          ity assumption. In particular, any polynomial-time probabilistic adversary that
                          controls some arbitrary number of voters and a number of authorities (below
                          some predetermined threshold) should be incapable of distinguishing which one
                          of the predetermined choices a certain voter selected or whether the voter en-
                          tered a write-in. In all voting schemes, once a certain number of votes have been
                          aggregated into a partial tally, secrecy is not mandatory, e.g., once the votes of a
                          precinct have been aggregated it is ok to reveal the partial tally (in fact in many
                          cases it is not even desired to keep the partial tallies secret, if some regional
                          statistics are to be extracted from the election results). Thus, voter secrecy will
                          have an associated Privacy Perimeter b which will refer to the smallest number
                          of votes that need to be aggregated into a partial tally before some information
                          about the partial tally can be revealed; we will talk of secrecy with b-perimeter
                          in this case.

                          Universal-Verifiability. Ensures that any party, including an outsider, can
                          be convinced that all valid votes have been included in the final tally. In the
                          online setting, where votes are casted electronically in a distributed fashion this
                          property typically relies on the existence of a digital record that maintains the
                          communication between all parties participated in the system. This notion was
   162   163   164   165   166   167   168   169   170   171   172