Page 248 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 248

J. van de Graaf
                          240
                          in the order of giga- or terabytes, for P = 500 (the average size of a precinct in Brazil).
                          However, by fine-tuning of the protocol and a careful analysis of the probabilities, sub-
                          stantial gains can be had.
                            For instance, a major cause is the expansion caused by the BCX, as every bit of the
                          channel needs at least one BCX, which is very inefficient representation. In fact, we
                          can show that a generalization of the bit commitment scheme used by Bos in his voting
                          protocol ([7], Chapter 3) has exactly the desired properties but with a constant size,
                          resulting in substantial gains. This will be detailed in the final version of this paper.
                          Another possibility for savings is that the current protocol is in some sense too robust,
                          and that by trading off the probability of catching someone cheating on an individual
                          vote some efficiency can be gained.
                          4.3 How to Prevent Ballot Marking
                          In the case of voting, a problem is that P i can choose the index s, the slot he wishes to
                          occupy, any way he likes. He could therefore abuse this freedom to mark his vote by
                          choosing a particular s, instead of choosing it at random.
                            Thesolutionis totake away P i ´s freedom to choose s. Instead, s must be determined
                          in some deterministic, pseudo-random way. As a first approach, one could apply a hash
                          function on v i , but this property can only be verified after all the contributions have
                          been posted – it would imply that contributions that do not fulfill this property will be
                          declared invalid.
                            A more general solution is obtained by calculating the hash on a set of known values,
                          such as the BCXs on M i andonthe R ij . For instance, the value h(BCX(M i ), BCX(R ij ))
                          could fix an arbitrary permutation π ∈{1,...,S}, which would be used to mix the slots
                          of C i ,i.e. C i [π(x)] = M i [x] ⊕ R i [x]. Again, the protocol in §3.2 would proof equality
                          respecting this permutation π.


                          5 Conclusions


                          This paper shows a conceptually simple protocol for voting with unconditional privacy.
                          The paper does so using a non-interactive version of the Dining-Cryptographers proto-
                          col, which is not as efficient (in terms of message size) as other voting protocols that
                          offer unconditional privacy, but is of interest in itself since it may have applications
                          other than voting.
                            The resulting protocol is certainly feasible for voting in small groups where the
                          chance of someone disrupting or not participating is low. Otherwise it might be wiser
                          to define a small number of authorities, whose main role is to reduce the interactions
                          necessary to eliminate no-showers. As in the mix networks, these authorities protect
                          the privacy of the voters, but unlike the mix case, there is no additional computational
                          assumption.
                            The author strongly believes that unconditional privacy for voting is a desirable prop-
                          erty. The fact that at some unknown point in the future voter privacy is completely vi-
                          olated is not acceptable, and the public may actually reject electronic voting systems
                          once this point becomes clear. Therefore, the search for practical voting protocols with
   243   244   245   246   247   248   249   250   251   252   253