Page 168 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 168
A. Kiayias and M. Yung
160
abstracted as the “bulletin board” by Benaloh [3]. In principle one can employ
Byzantine agreement, c.f. [16,17,23,22], to ensure the integrity of such a record.
Moreover, in a practical implementation one can employ a publicly accessible
database server for storing the bulletin board data [32] and potentially rely on
database replication for maintaining the availability of the record.
Robustness. Ensures that the system can tolerate a certain number of faulty
participants while it maintains its secrecy and verifiability properties. Faults may
be non-malicious (e.g., processes crashing) or malicious (e.g., executing arbitrary
code).
Fairness. It should be ensured that no partial results become known prior to
the end of the election procedure to any subset of participants.
Another property, which we do not deal with here explicitly, is Receipt-
Freeness [5,41,34,27,30]. Standard techniques that use re-randomizers (see e.g.
[2]) can be readily employed in our schemes to allow certain forms of this property
assuming the independence of ciphertext randomizing entity from coercers or
malicious users.
Homomorphic Encryption Schemes. An encryption scheme is a triple K, E,
D . The key-generation K is a probabilistic TM which on input a parameter
1 w (which specifies the key-length) outputs a key-pair pk, sk (public-key and
secret-key respectively). The encryption function is a probabilistic TM E pk :
R × P → C,where R is the randomness space, P is the plaintext space, and C
the ciphertext space. When P, for a given security parameter, equals Z a where a
is an integer that is a function of the parameter, we will say that the encryption
function has “additive capacity” (or just capacity) a. The correctness property
of the encryption scheme is that D sk (E sk (·,x)) = x for all x independently of the
coin tosses of the encryption function E. If we want to specify the coin tosses
of E we will write E pk (r, x) to denote the ciphertext that corresponds to the
plaintext x when the encryption function E pk makes the coin tosses r.Otherwise
we will consider E pk (x) to be a random variable. For homomorphic encryption,
defined over the respective spaces
we assume additionally the operations +, ⊕,
are (families of) groups written additively
P, R, C,so that P, + , R, ⊕ , C,
(the first two) and multiplicatively respectively.
Definition 1. An encryption function E is homomorphic if, for all r 1 ,r 2 ∈ R
and all x 1 ,x 2 ∈ P, it holds that E pk (r 1 ,x 1 ) E pk (r 2 ,x 2 )= E pk (r 1 ⊕ r 2 ,x 1 + x 2 ).
We will consider two examples of Homomorphic Encryption schemes: “additive”
ElGamal and Paillier Encryption. Both have been employed in the design of
e-voting schemes in the past, see [11] and [14,2] respectively (which are also part
of the current state-of-the-art schemes in the homomorphic encryption based
approach). We define them below:
Additive ElGamal Encryption. It is defined by a triple K, E, D : the key-generation
K outputs the description of a finite multiplicative group G of prime order q,with
three generators g, h, f which are set to be the public-key of the system pk;the

