A Secure and Optimally Eecient Multi-authority Election Scheme
نویسندگان
چکیده
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal veriiability, and ro-bustness. It is the rst scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the scheme is that the time and communication complexity for the voter is independent of the number of authorities. A voter simply posts a single encrypted message accompanied by a compact proof that it contains a valid vote. Our result is complementary to the result by Cramer, Franklin, Schoenmakers, and Yung in the sense that in their scheme the work for voters is linear in the number of authorities but can be instantiated to yield information-theoretic privacy, while in our scheme the voter's eeort is independent of the number of authorities but always provides computational privacy-protection. We will also point out that the majority of proposed voting schemes provide computational privacy only (often without even considering the lack of information-theoretic privacy), and that our new scheme is by far superior to those schemes.
منابع مشابه
A Secure and Optimally Efficient Multi-Authority Election Scheme
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the scheme is that the time and communication comple...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملAn Improved Leader Election Protocol in Multi-hop Radio Networks
This paper presents two randomized protocols for the problem of electing a \leader" among a set of nodes in an arbitrary multi-hop radio network. First, a variation of the leader election protocol by Bar-Yehuda et al. BGI87] is presented, in which the termination problem is addressed. Then, an eecient randomized leader election protocol in arbitrary multi-hop radio networks is presented. Our el...
متن کاملOutsourcing Decryption of Multi-Authority ABE Ciphertexts
The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, we improve Chase’s scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore, we apply the LMSSS to outsource the decryption of multi-autho...
متن کاملCommunication-eecient Anonymous Group Identiication
Identiication schemes allow a user to identify herself to a verifying authority in a secure way (i.e., without revealing her secret key). Group identiication schemes allow a user to identify herself as a member of a group of users in a secure and anonymous way (i.e., without revealing her identity nor her secret key). Several identiication schemes and group identiication schemes have been propo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997