On the Possibility of Non-interactive E-Voting in the Public-Key Setting

نویسندگان

  • Rosario Giustolisi
  • Vincenzo Iovino
  • Peter B. Rønne
چکیده

In 2010 Hao, Ryan and Zielinski proposed a simple decentralized evoting protocol that only requires 2 rounds of communication. Thus, for k elections their protocol needs 2k rounds of communication. Observing that the first round of their protocol is aimed to establish the publickeys of the voters, we propose an extension of the protocol as a non-interactive e-voting scheme in the public-key setting (NIVS) in which the voters, after having published their public-keys, can use the corresponding secret-keys to participate in an arbitrary number of one-round elections. We first construct a NIVS with a standard tally function where the number of votes for each candidate is counted. Further, we present constructions for two alternative types of elections. Specifically in the first type (dead or alive elections) the tally shows if at least one voter cast a vote for the candidate. In the second one (elections by unanimity), the tally shows if all voters cast a vote for the candidate. Our constructions are based on bilinear maps of prime order. As definitional contribution we provide formal computational definitions for privacy and verifiability of NIVSs. We conclude by showing intriguing relations between our results, secure computation, electronic exams and conference management systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrating Interactive Whiteboards in EFL Learners' Learning and Retention of Non-congruent Collocations

Drawing on the assumptions of socio-cognitive linguistics, focusing on the effective role of interaction in terms of reducing the cognitive burden in the process of learning, this quasi-experimental study aimed at investigating the effect of the Interactive Whiteboard (IWB) usage on the learning and retention of non-congruent collocations among 60 homogenized Iranian EFL learners, aged 18 to 24...

متن کامل

Integrating Interactive Whiteboards in EFL Learners' Learning and Retention of Non-congruent Collocations

Drawing on the assumptions of socio-cognitive linguistics, focusing on the effective role of interaction in terms of reducing the cognitive burden in the process of learning, this quasi-experimental study aimed at investigating the effect of the Interactive Whiteboard (IWB) usage on the learning and retention of non-congruent collocations among 60 homogenized Iranian EFL learners, aged 18 to 24...

متن کامل

The Impact of Management Control Systems on Contemporary Management Accounting Practices in the Public Sector

The purpose of this paper is to investigate the effect of the interactive and diagnostic use of management control systems on the adoption and success of contemporary management accounting practices in the public sector. Contemporary management accounting practices includes: benchmarking, activity-based costing, the balanced scorecard, value chain analysis, total quality management, key perform...

متن کامل

D4.1 - Security definitions and attacker models for e-voting protocols

In 2010 Hao, Ryan and Zielinski proposed a simple decentralized e-voting protocol that only requires 2 rounds of communication. Thus, for k elections their protocol needs 2k rounds of communication. Observing that the first round of their protocol is aimed to establish the public-keys of the voters, we propose an extension of the protocol as a non-interactive e-voting scheme in the public-key s...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015