Distributed creation of the ballot form in Prêt à Voter using an element of Visual Encryption

نویسندگان

  • D. Lundin
  • H. Treharne
  • P. Y. A. Ryan
  • S. Schneider
چکیده

In this paper we present an extension of the Prêt à Voter e-voting system that introduces visual encryption to solve the chain voting problem and ensures that no organisation sees the layout of the ballot form prior to its use. The chain voting problem in Prêt à Voter is that anyone who can see the ballot prior to its use can coerce a voter by noting down the details of the form and then requiring it to be used by the voter. This solution is based on requiring the tellers to be active in ballot creation. Further benefits are the use of symmetric key encryption to potentially provide higher cryptographic security, automatic and mandatory well-formedness checks on the ballot forms used can be performed and visual encryption also results in a solution to the problem of enforced destruction of the candidate list.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption

Prêt à Voter and Punchscan are two electronic voting schemes that both use paper based ballot forms, part of which is detached and destroyed, to provide receipt-free voter verifiability. However, both schemes share the chain voting problem and the part destruction problem. The first is where anyone who can see the ballot form before it is used can coerce a voter who uses it and the latter where...

متن کامل

Prêt à Voter: All-In-One

A number of voter-verifiable electronic voting schemes have been introduced in the recent decades. These schemes not only provide each voter with a receipt without the threat of coercion and ballot selling, but also the ballot tallying phase can be publicly verified. Furthermore, these schemes are robust because the power of authorities can be threshold distributed. Generally speaking, the homo...

متن کامل

Ballot Permutations in Prêt à Voter

Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Voter that uses Paillier encryption allows general permutations of candidates on the ballot, rather than just cyclic shifts. This improves the robustness of the system against an adversary who tries to al...

متن کامل

The Prêt à Voter Verifiable Election System

The Prêt à Voter election system has undergone several revisions and enhancements since its inception in 2004, resulting in a family of election systems designed to provide end-to-end verifiability and a high degree of transparency while ensuring secrecy of the ballot. Assurance for these systems arises from the auditability of the election itself, rather than the need to place trust in the sys...

متن کامل

Merging Prêt-à-Voter and PunchScan

We describe a variation of the Prêt-à-Voter voting protocol that keeps the same ballot layout but borrows and slightly modifies the underlying cryptographic primitives from Punchscan, which is based on bit commitments. By using unconditionally hiding bit commitments, our protocol obtains unconditional privacy. We suggest a way to make cheating on the computational binding bit commitments imposs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006