Page 180 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 180

A. Kiayias and M. Yung
                          172
                          Remark. It has been brought to our attention that a scheme related to the
                          punch-hole approach (without the combination of vector-ballots/ write-in votes)
                          appeared in the Ph.D. Thesis of M. Hirt [28].
                          Space-Time Tradeoffs. It is possible to obtain a hybrid between the standard
                          paradigm and the punch-hole by having a vector of registers of smaller capacity
                          that will be aggregating the votes for small subsets of candidates (as opposed
                          to a single candidate in the punch-hole case above). This yields an immediate
                          space-time tradeoff in terms of encrypted ballot encoding and time to recover
                          the result.
                          Acknowledgement. We thank Ron Rivest for his motivating question regard-
                          ing homomorphic encryption and writein ballot combination and to Pierre-Alain
                          Fouque for getting it to our attention and for related discussions.


                          References


                           1. Abe, M., Hoshino, F.: Remarks on Mix-Networks Based on Permutation Networks.
                             In: PKC 2001 (2001)
                           2. Baudron, O., Fouque, P.-A., Pointcheval, D., Poupard, G., Stern, J.: Practical
                             Multi-Candidate Election system. In: The Proceedings of the ACM Symposium on
                             Principles of Distributed Computing PODC (2001)
                           3. Benaloh, J.: Verifiable Secret-Ballot Elections, PhD Thesis, Yale University (1987)
                           4. Benaloh, J., Yung, M.: Distributing the Power of a Government to Enhance the
                             Privacy of Voters. In: The proceedings of the ACM Symposium on Principles of
                             Distributed Computing PODC (1986)
                           5. Benaloh, J., Tuinstra, D.: Receipt-Free Secret-Ballot Elections. In: STOC 1994
                             (1994)
                           6. Boneh, D., Golle, P.: Almost Entirely Correct Mixing With Applications to Voting.
                             In: 9th ACM-CCS Conference (2002)
                           7. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital
                             Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
                           8. Chaum, D.: Blind Signatures for Untraceable Payments. In: CRYPTO 1982,
                             pp. 199–203 (1982)
                           9. Chaum, D.: Elections with unconditionally-secret ballots and disruption equivalent
                             to breaking RSA. In: G¨unther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330,
                             pp. 177–182. Springer, Heidelberg (1988)
                          10. Cohen (Benaloh), J.D., Fischer, M.J.: A Robust and Verifiable Cryptographically
                             Secure Election Scheme. In: FOCS 1985 (1985)
                          11. Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient
                             multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS,
                             vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
                          12. Cramer, R., Damg˚ard, I.B., Schoenmakers, B.: Proof of partial knowledge and
                             simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO
                             1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)
                          13. Cramer, R., Franklin, M.K., Schoenmakers, B., Yung, M.: Multi-authority secret-
                             ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996.
                             LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)
   175   176   177   178   179   180   181   182   183   184   185