Skip to main content

An Open Framework for Remote Electronic Elections

  • Conference paper
Cryptology and Network Security (CANS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5339))

Included in the following conference series:

  • 648 Accesses

Abstract

We propose a framework for remote electronic elections with an independent, trustworthy authorization proxy. Unlike existing voting systems, voter authorization is separated from particular elections in our scheme, and is done through reusable credentials granted by the proxy. Moreover, different types of elections can fit in the framework, with different sets of legitimate voters and even different designs of voting and tabulation. We also define a cryptographic protocol for the credential generation and the election registration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pp. 104–115 (2001)

    Google Scholar 

  2. Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proceedings of the 11th conference Theoretical Aspects of Rationality and Knowledge (TARK), pp. 62–71. ACM, New York (2007)

    Chapter  Google Scholar 

  3. Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 274–283. ACM, New York (2001)

    Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  6. Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  7. Chaum, D., Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118–167. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  8. Chaum, D., Ryan, P.Y.A., Schneider, S.A.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Chen, L.: Access with pseudonyms. In: Dawson, E.P., Golić, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 232–243. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  10. Chow, S.S., Liu, J.K., Wong, D.S.: Robust receipt-free election system with ballot secrecy and verifiability. In: Network and Distributed System Security Symposium, pp. 81–94 (2008)

    Google Scholar 

  11. Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy 2008, pp. 354–368. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  12. DamgÃ¥rd, I.: Payment systems and credential mechanisms with provable security against abuse by individuals. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 328–335. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  13. Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (pcl). Electronic Notes in Theoretical Computer Science 172, 311–358 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: IEEE Computer Security Foundations Workshop (CSFW-19), pp. 28–42. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  15. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: ASIACRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1992)

    Google Scholar 

  16. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Hosp, B., Popoveniuc, S.: An introduction to punchscan. Technical report (2006), http://www.punchscan.org/papers/popoveniuc_hosp_punchscan_introduction.pdf

  18. Jakobsson, M., Juels, A.: Mix and match: Secure function evaluation via ciphertexts. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 162–177. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  19. Jakobsson, M., Sako, K., Impagliazzoand, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  20. Jonker, H., Pieters, W.: Receipt-freeness as a special case of anonymity in epistemic logic. In: IAVoSS Workshop On Trustworthy Elections, WOTE 2006 (2006)

    Google Scholar 

  21. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70. ACM, New York (2005)

    Chapter  Google Scholar 

  22. Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: IEEE Symposium on Security and Privacy, pp. 27–40. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  23. Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Information Processing Leters 56(3), 131–133 (1995)

    Article  MATH  Google Scholar 

  24. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  25. MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 385–400. Springer, Heidelberg (2000)

    Google Scholar 

  26. Meadows, C.: Ordering from satan’s menu: a survey of requirements specification for formal analysis of cryptographic protocols. Science of Computer Programming 50(1-3), 3–22 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  27. Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  28. Ryan, P.Y.A., Schneider, S.A.: Prêt á voter with re-encryption mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 313–326. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  29. Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy 1997, pp. 44–54. IEEE Computer Society, Los Alamitos (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y. (2008). An Open Framework for Remote Electronic Elections. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds) Cryptology and Network Security. CANS 2008. Lecture Notes in Computer Science, vol 5339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89641-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89641-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89640-1

  • Online ISBN: 978-3-540-89641-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics