Oblivious Voting—Hiding Votes from the Voting Machine in Bingo Voting

Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill

2016

Abstract

When designing an electronic voting scheme it is notoriously difficult to guarantee the secrecy of the vote as well as the correctness of the tally, even in the presence of a malicious adversary. Research in (offline) cryptographic voting schemes has largely relied on a trusted voting machine for guaranteeing security. We alleviate part of this trust requirement. Our scheme ensures the confidentiality of the vote even in the presence of an honest-but-curious voting machine. We improve on Bohli et al.’s Bingo Voting scheme (Bohli et al., 2007). Bingo Voting already guarantees the correctness and public verifiability of the election in spite of a malicious voting machine. The voting machine learns the voter’s input however, and is trusted not to violate ballot secrecy. Our novel construction’s output is identical to that of Bingo Voting. We devise an electro-mechanical Physical Oblivious Transfer (pOT) device to remove that trust requirement by hiding the voter’s choice from the voting machine. The pOT device is realised in such a way that the voter merely operates a button to express her choice. Our construction is thus particularly user-friendly.

References

  1. Adida, B. (2008). Helios: Web-based open-audit voting. In USENIX Security Symposium, volume 17, pages 335-348.
  2. Based, M. A., Tsay, J.-K., and Mjølsnes, S. F. (2012). Pevs: A secure electronic voting scheme using polling booths. In Data and Knowledge Engineering, pages 189-205. Springer.
  3. Blazy, O., Fuchsbauer, G., Pointcheval, D., and Vergnaud, D. (2011). Signatures on randomizable ciphertexts. In Public Key Cryptography-PKC 2011 , pages 403-422. Springer.
  4. Bohli, J.-M., Müller-Quade, J., and Röhrich, S. (2007). Bingo voting: Secure and coercion-free voting using a trusted random number generator. In Alkassar, A.
  5. and Volkamer, M., editors, E-Voting and Identity, volume 4896 of Lecture Notes in Computer Science, pages 111-124. Springer Berlin Heidelberg.
  6. Chaum, D., Carback, R. T., Clark, J., Conway, J., Essex, A., S, H. P., Mayberry, T., Popoveniuc, S., Rivest, R. L., Shen, E., Sherman, A. T., and Vora, P. L. (2010). Scantegrity ii municipal election at takoma park: the first e2e binding governmental election with ballot privacy. In 19th USENIX Security Symposium.
  7. Chaum, D., Carback, R. T., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., Ryan, P. Y., Shen, E., Sherman, A. T., and Vora, P. L. (2009). Scantegrity ii: End-to-end verifiability by voters of optical scan elections through confirmation codes. Information Forensics and Security, IEEE Transactions on, 4(4):611-627.
  8. Cortier, V., Fuchsbauer, G., and Galindo, D. (2015). Beleniosrf: A strongly receipt-free electronic voting scheme. Cryptology ePrint Archive, Report 2015/629. http://eprint.iacr.org/2015/629.
  9. Cramer, R., Damga°rd, I., and Nielsen, J. B. (2001). Multiparty computation from threshold homomorphic encryption. Springer.
  10. Feldman, A. J., Halderman, J. A., and Felten, E. W. (2006). Security analysis of the diebold accuvote-ts voting machine.
  11. Katz, J. (2007). Universally composable multi-party computation using tamper-proof hardware. In Advances in Cryptology-EUROCRYPT 2007, pages 115-128. Springer.
  12. Katz, J. and Lindell, Y. (2007). Introduction to modern cryptography: principles and protocols. CRC press.
  13. Kilian, J. (1988). Founding crytpography on oblivious transfer. In Proceedings of the twentieth annual ACM symposium on Theory of computing, pages 20-31. ACM.
  14. Moran, T. and Naor, M. (2010). Split-ballot voting: everlasting privacy with distributed trust. ACM Transactions on Information and System Security (TISSEC), 13(2):16.
  15. Moran, T. and Segev, G. (2008). David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware. In Advances in CryptologyEUROCRYPT 2008, pages 527-544. Springer.
  16. Pedersen, T. P. (1992). Advances in Cryptology - CRYPTO 7891: Proceedings, chapter Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, pages 129-140. Springer Berlin Heidelberg, Berlin, Heidelberg.
  17. Ryan, P. Y. A., Roenne, P. B., and Iovino, V. (2015). Selene: Voting with transparent verifiability and coercion-mitigation. Cryptology ePrint Archive, Report 2015/1105. http://eprint.iacr.org/2015/1105.
Download


Paper Citation


in Harvard Style

Achenbach D., Löwe B., Müller-Quade J. and Rill J. (2016). Oblivious Voting—Hiding Votes from the Voting Machine in Bingo Voting . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 85-96. DOI: 10.5220/0005964300850096


in Bibtex Style

@conference{secrypt16,
author={Dirk Achenbach and Bernhard Löwe and Jörn Müller-Quade and Jochen Rill},
title={Oblivious Voting—Hiding Votes from the Voting Machine in Bingo Voting},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={85-96},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005964300850096},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Oblivious Voting—Hiding Votes from the Voting Machine in Bingo Voting
SN - 978-989-758-196-0
AU - Achenbach D.
AU - Löwe B.
AU - Müller-Quade J.
AU - Rill J.
PY - 2016
SP - 85
EP - 96
DO - 10.5220/0005964300850096