WO2002077754A2 - Detecting compromised ballots - Google Patents
Detecting compromised ballots Download PDFInfo
- Publication number
- WO2002077754A2 WO2002077754A2 PCT/US2002/005969 US0205969W WO02077754A2 WO 2002077754 A2 WO2002077754 A2 WO 2002077754A2 US 0205969 W US0205969 W US 0205969W WO 02077754 A2 WO02077754 A2 WO 02077754A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ballot
- confirmation
- choice
- voter
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
- H04L2209/463—Electronic voting
Definitions
- Figure 1 is a high-level block diagram showing a typical environment in which the facility operates.
- Figure 2 is a block diagram showing some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes.
- Ballot Construction A set of cryptographic election parameters are agreed upon by election officials in advance, and made publicly known by wide publication or other such means. Significant parameters are the encryption group, generator, election public key and decision encoding scheme. More specifically, these are:
- v i only makes choices through some user interface, it is not realistic to expect her to observe the actual value of the bits sent and check them for consistency with her intended choice.
- the vote client can ignore voter intent and submit a " ⁇ - vote" when the voter actually wished to submit a " ⁇ k vote.”
- the voter typically needs some way to verify that the encrypted vote which was received at the vote collection center is consistent with her choice. Simply making the ballot box data public does not a reasonable solution, since the vote client, not the voter, chooses a t .
- This example assumes an election protocol that encodes voter responses (answers) as a single ElGamal pair.
- some embodiments of the facility incorporate the homomorphic election protocol described in U.S. Patent Application No. 09/535,927. In that protocol, a voter response, is represented by multiple ElGamal pairs.
- the confirmation dictionary used in this example is easily modified to either display a concatenation of the respective confirmation strings, or to display a hash of the sequence of them.
- the jurisdiction must first agree on the election initialization data. This at least includes: the basic cryptographic numerical parameters, a ballot (i.e., a set of questions and allowable answers, etc.) and a decision encoding scheme. (It may also include additional data relevant to the particular election protocol being used.)
- V generates ⁇ 2 e R Z 23 , r ⁇ , r 3 , r A e R Z 2 , s s 3 , s 4 e R Z 23 all randomly and independently. For this example we take
- V uses a publicly specified hash function H to compute c e Z 23 as
- the defining properties of P are
- V 's validity proof consists of the 12 numbers
- V encodes these elements, in sequence, as defined by the standard encoding format.
- the resulting sequences form V 's voted ballot.
- V may also digitally sign this voted ballot with his private signing key.
- the resulting combination of V 's voted ballot, and his digital signature forms his signed voted ballot.
- each voter transmits his (optionally signed) voted ballot back to the data center collecting the votes.
- the voter specific random parameters for V ( ⁇ and K are available at the vote collection center. In this example, these are
- the digital signature is checked to determine the authenticity of the ballot, as well as the eligibility of the voter.
- step 2 If the signature in step 1 verifies correctly, the vote collection center then verifies the proof of validity. For the particular type of validity proof we have chosen to use in this example, this consists of
- This sequenced pair is encoded as specified by the public encoding format, and returned to V .
- the protocol may specify that a public hash function is computed on C and the resulting hash value displayed. In this example, C itself is displayed.
- V the protocol
- V attempts to submit a choice other than "Green”
- the value of C computed above would be different.
- the correct value of C cannot be computed from an incorrect one without solving the Diffie-Hellman problem. (For the small values of p and q we have used here, this is possible.
- V's computer would be unable to do this.
- V's computer has submitted an encrypted ballot which does not correspond to F's choice, there are only two things it can do at the point it is expected to display a confirmation. It can display something, or it can display nothing. In the case that nothing is displayed, V may take this as an indication that the ballot was corrupted. In the case that something is displayed, what is displayed will almost certainly be wrong, and again, V may take this as an indication that the ballot was corrupted.
- V now compares the value of C displayed to the value found in V 's confirmation dictionary corresponding to the choice, "Green" (V 's intended choice). At this point, V may have already received his confirmation dictionary in advance, or may obtain a copy through any independent channel. An example of such a channel would be to use a fax machine. If the displayed value does not match the corresponding confirmation string in the confirmation dictionary, corruption is detected, and the ballot can be
- Each voter confirmation dictionary is computed by the vote collection center, since, as described above, it is the entity which has knowledge of the voter specific values of a and K .
- the dictionary is computed as
- the resulting distribution on the election parameters and C lk is obviously identical to the distribution that arises from real elections.
- probability e A can display C Ik , so can compute
- A is said to have an e-DDH advantage if A can, with probability 1/2+ e,
- Corollary 3 Eet & DDH be an upper bound on A's DDH advantage. Then, ifH is any hash function with negligible collision probability, an upper bound on the probability that A can submit a vote that differs from the voter's choice, and yet display the correct confirmation string is e 0 +(K ⁇ ⁇ ) ⁇ Dm .
- SVC may not offer any protection if the adversary, A, also controls the vote collection center. If this were the case, A has access to K t and ⁇ v and thus can easily display any valid confirmation string of its choosing. It seems unlikely that this would happen, since the vote collection center would be undeniably implicated in the event that such activity is discovered. Nevertheless, in case it is unacceptable to trust the vote collection center in this regard, the "confirmation responsibility" can be distributed among arbitrarily many authorities.
- each authority A l ⁇ j ⁇ J, generates
- the voter's confirmation string is computed as a concatenation, in pre-specified order, of the individual confirmation strings (computed separately as in the previous section) corresponding to each of the J authorities. In this case, confirmation is successful only if all of the substrings verify correctly.
- A is given a sequence of tuples, (X n ,Y n ,Z n ,C n ,D n ), where
- X n ,Y n ,Z n are generated independently at random. Let R n be generated independently at random, and let O n be the solution to log ⁇ O ⁇ log ⁇ F ⁇ lo ⁇ Z ⁇ . With probability 1/2,
- the client, M ⁇ submits a an encrypted ballot on behalf of v t as before, but redundantly encrypted with both h and h .
- a ⁇ is selected independently of a t .
- M t also constructs a simple proof of validity (essentially a single Chaum- Pedersen proof) that the two are encryptions of the same value.
- the vote collection center selects random K ⁇ ig); ⁇ Z and computes
- the vote collection center returns h ⁇ ' and V i to M f .
- the value d i is always kept secret, but the value h t is communicated to v..
- the facility communicates h f to v ⁇ as follows:
- A-l v t contacts the vote collection center and authenticates himself/herself A-2 Assuming authentication is successful, the vote collection center:
- FIG. 1 is a high-level block diagram showing a typical environment in which the facility operates.
- the block diagram shows several voter computer systems 110, each of which may be used by a voter to submit a ballot and verify its uncorrupted receipt.
- Each of the voter computer systems are connected via the Internet 120 to a vote collection center computer system 150.
- the facility transmits ballots from the voter computer systems to the vote collection center computer system, which returns an encrypted vote confirmation.
- the facility uses this encrypted vote confirmation to determine whether the submitted ballot has been corrupted. While preferred embodiments are described in terms in the environment described above, those skilled in the art will appreciate that the facility may be implemented in a variety of other environments including a single, monolithic computer system, as well as various other combinations of computer systems or similar devices connected in various ways.
- FIG. 2 is a block diagram showing some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes, such as computer systems 110 and 130.
- These computer systems and devices 200 may include one or more central processing units (“CPUs") 201 for executing computer programs; a computer memory 202 for storing programs and data while they are being used; a persistent storage device 203, such as a hard drive for persistently storing programs and data; a computer-readable media drive 204, such as a CD-ROM drive, for reading programs and data stored on a computer-readable medium; and a network connection 205 for connecting the computer system to other computer systems, such as via the Internet.
- CPUs central processing units
- a computer memory 202 for storing programs and data while they are being used
- a persistent storage device 203 such as a hard drive for persistently storing programs and data
- a computer-readable media drive 204 such as a CD-ROM drive, for reading programs and data stored on a computer-readable medium
- FIG. 3 is a flow diagram showing steps typically performed by the facility in order to detect a compromised ballot.
- the facility may perform a set of steps that diverges from those shown, including proper supersets and subsets of these steps, reorderings of these steps, and steps of sets in which performance of certain steps by other computing devices.
- step 301 on the voter computer system, the facility encodes a ballot choice selected by the voter in order to form a ballot.
- the facility encrypts this ballot.
- the encrypted ballot is an ElGamal pair, generated using an election public key and a secret maintained on the voter computer system.
- step 303 the facility optionally signs the ballot with a private key belonging to the voter.
- step 304 the facility constructs a validity proof that demonstrates that the encrypted ballot is the encryption of a ballot in which a valid ballot choice is selected.
- step 305 the facility transmits the encrypted, signed ballot and the validity proof to a vote collection center computer system.
- step 321 the facility receives this transmission in the vote collection center computer system.
- step 322 the facility verifies the received validity proof.
- step 324 the facility generates an encrypted confirmation of the encrypted ballot. The facility does so without decrypting the ballot, which is typically not possible in the vote collection center computer system, where the secret used to encrypt the ballot is not available.
- step 325 the facility transmits the encrypted confirmation 331 to the voter computer system.
- step 341 the facility receives the encrypted vote confirmation in the voter computer system.
- step 342 the facility uses the secret maintained on the voter computer system to decrypt the encrypted vote confirmation.
- step 343, the facility displays the decrypted vote confirmation for viewing by the user.
- step 344 if the displayed vote confirmation is translated to the ballot choice selected by the voter by a confirmation dictionary in the voter's possession, then the facility continues in step 345, else the facility continues in step 346.
- step 345 the facility determines that the voter's ballot is not corrupted, whereas, in step 346, the facility determines that the voter's ballot is corrupted. In this event, embodiments of the facility assist the user in revoking and resubmitting the voter's ballot.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020037010946A KR100556055B1 (en) | 2001-02-20 | 2002-02-20 | Detection of compromised votes |
EP02753759A EP1371169A2 (en) | 2001-02-20 | 2002-02-20 | Detecting compromised ballots |
CA002439093A CA2439093A1 (en) | 2001-02-20 | 2002-02-20 | Detecting compromised ballots |
JP2002575744A JP2004524759A (en) | 2001-02-20 | 2002-02-20 | Detecting compromised voting |
AU2002306602A AU2002306602A1 (en) | 2001-02-20 | 2002-02-20 | Detecting compromised ballots |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US27018201P | 2001-02-20 | 2001-02-20 | |
US60/270,182 | 2001-02-20 | ||
US09/816,869 US6950948B2 (en) | 2000-03-24 | 2001-03-24 | Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections |
US09/816,869 | 2001-03-24 | ||
US35585702P | 2002-02-11 | 2002-02-11 | |
US60/355,857 | 2002-02-11 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002077754A2 true WO2002077754A2 (en) | 2002-10-03 |
WO2002077754A3 WO2002077754A3 (en) | 2003-01-09 |
Family
ID=27402264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/005969 WO2002077754A2 (en) | 2001-02-20 | 2002-02-20 | Detecting compromised ballots |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1371169A2 (en) |
JP (1) | JP2004524759A (en) |
CN (1) | CN1513241A (en) |
AU (1) | AU2002306602A1 (en) |
CA (1) | CA2439093A1 (en) |
RU (1) | RU2272322C2 (en) |
WO (1) | WO2002077754A2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903325B (en) * | 2013-07-08 | 2016-02-24 | 苏州大学 | Safe electronic voting system based on identity signature |
RU2652443C1 (en) * | 2017-07-17 | 2018-04-26 | Акционерное общество "Лаборатория Касперского" | Voters votes quantity collected by electronic voting determining system and method |
JP7064947B2 (en) * | 2017-09-15 | 2022-05-11 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | Electronic voting system and control method |
JP7064950B2 (en) * | 2017-09-15 | 2022-05-11 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | Electronic voting system and control method |
CN112118046B (en) * | 2020-09-22 | 2021-08-24 | 中国科学院半导体研究所 | Encrypted electronic voting system and method based on indoor LED visible light communication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5521980A (en) * | 1993-08-02 | 1996-05-28 | Brands; Stefanus A. | Privacy-protected transfer of electronic information |
US5708714A (en) * | 1994-07-29 | 1998-01-13 | Canon Kabushiki Kaisha | Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses |
-
2002
- 2002-02-20 CA CA002439093A patent/CA2439093A1/en not_active Abandoned
- 2002-02-20 AU AU2002306602A patent/AU2002306602A1/en not_active Abandoned
- 2002-02-20 JP JP2002575744A patent/JP2004524759A/en active Pending
- 2002-02-20 CN CNA028085205A patent/CN1513241A/en active Pending
- 2002-02-20 RU RU2003128316/09A patent/RU2272322C2/en not_active IP Right Cessation
- 2002-02-20 EP EP02753759A patent/EP1371169A2/en not_active Withdrawn
- 2002-02-20 WO PCT/US2002/005969 patent/WO2002077754A2/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5521980A (en) * | 1993-08-02 | 1996-05-28 | Brands; Stefanus A. | Privacy-protected transfer of electronic information |
US5708714A (en) * | 1994-07-29 | 1998-01-13 | Canon Kabushiki Kaisha | Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses |
Also Published As
Publication number | Publication date |
---|---|
WO2002077754A3 (en) | 2003-01-09 |
EP1371169A2 (en) | 2003-12-17 |
RU2003128316A (en) | 2005-03-27 |
JP2004524759A (en) | 2004-08-12 |
CN1513241A (en) | 2004-07-14 |
AU2002306602A1 (en) | 2002-10-08 |
RU2272322C2 (en) | 2006-03-20 |
CA2439093A1 (en) | 2002-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7099471B2 (en) | Detecting compromised ballots | |
Haines et al. | How not to prove your election outcome | |
Ryan et al. | Pretty good democracy | |
JP2006115550A (en) | Secret shuffle for making encrypted data like el gamal encryption data for safe plural authority elections to be verifiable | |
Li et al. | A taxonomy and comparison of remote voting schemes | |
Fouard et al. | Survey on electronic voting schemes | |
WO2001020562A2 (en) | Multiway election method and apparatus | |
US20030028423A1 (en) | Detecting compromised ballots | |
EP1361693B1 (en) | Handle deciphering system and handle deciphering method, and program | |
Gardner et al. | Coercion resistant end-to-end voting | |
US20060085647A1 (en) | Detecting compromised ballots | |
WO2002077754A2 (en) | Detecting compromised ballots | |
Clarkson et al. | Civitas: A secure voting system | |
Cetinkaya et al. | Pseudo-voter identity (pvid) scheme for e-voting protocols | |
JP3910529B2 (en) | Electronic voting system | |
Haghighat et al. | An efficient and provably-secure coercion-resistant e-voting protocol | |
Khader et al. | Proving {Prêt}{à} Voter Receipt Free Using Computational Security Models | |
WO2002067174A2 (en) | Detecting compromised ballots | |
KR100556055B1 (en) | Detection of compromised votes | |
McMurtry | Verifiable Vote-by-mail | |
Desmedt et al. | Identity-based key infrastructures (iki) | |
Dall'Olio et al. | Voting with Designated Verifier Signature-Like Protocol. | |
Panja | Zero-Knowledge Proof, Deniability and Their Applications in Blockchain, E-Voting and Deniable Secret Handshake Protocols | |
Goulet et al. | Surveying and improving electronic voting schemes | |
Al-Saidi et al. | A Secure Electronic Voting Scheme Based on EVOX-MA and REVS-E Voting Blind Signature Protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2439093 Country of ref document: CA Ref document number: 1020037010946 Country of ref document: KR Ref document number: 2002575744 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002753759 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 028085205 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2002753759 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1020037010946 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020037010946 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002753759 Country of ref document: EP |