Skip to main content

E-Voting: A New Approach Using Double-Blind Identity-Based Encryption

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6711))

Included in the following conference series:

Abstract

We present a new cryptographic construction, double-blind identity-based encryption (DB-IBE). In standard IBE, the identity string that is passed to a key generation centre (\(\mathcal{KGC}\) ) during the key extraction phase is visible to the \(\mathcal{KGC}\) . Recent work introduced the idea of blinding the identity string, resulting in a blind IBE scheme which obscures the identity string from a \(\mathcal{KGC}\) . Double-blind IBE schemes, which are extensions of blind IBE schemes, allow a user to construct an identity string that is partially obscured from the \(\mathcal{KGC}\) , while also facilitating the \(\mathcal{KGC}\) adding elements to the identity string which are obscured from the user. Using DB-IBE, we present an e-voting scheme with desirable features such as universal verifiability, voter verifiability and receipt-freeness.

The authors thank Science Foundation Ireland (SFI) for support under grant 08/RFP/CMS1347.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adida, B., Neff, C.A.: Ballot casting assurance. In: EVT 2006, Proceedings of the First Usenix/ACCURATE Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 1 (2006)

    Google Scholar 

  2. Adida, B., Rivest, R.L.: Scratch & vote: self-contained paper-based cryptographic voting. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 29–40. ACM, New York (2006)

    Chapter  Google Scholar 

  3. Anane, R., Freeland, R., Theodoropoulos, G.: e-Voting Requirements and Implementation. In: The 9th IEEE International Conference on E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, CEC/EEE 2007, pp. 382–392 (2007)

    Google Scholar 

  4. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 544–553. ACM, New York (1994)

    Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196–214. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Advances in Cryptology (CRYPTO 1983). LNCS, vol. 82, pp. 23–25 (1982)

    Google Scholar 

  8. Chaum, D.: Zero-knowledge undeniable signatures. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 458–464. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  9. Chaum, D.: Designated confirmer signatures. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 86–91. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  10. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy Magazine 2(1), 38–47 (2004)

    Article  Google Scholar 

  11. Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)

    Google Scholar 

  12. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  13. Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  14. Delaune, S., Kremer, S., Ryan, M.: Verifying Properties of Electronic-Voting Protocols. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), pp. 45–52 (2006)

    Google Scholar 

  15. Dini, G.: A secure and available electronic voting service for a large-scale distributed system. Future Generation Computer Systems 19(1), 69–85 (2003)

    Article  MATH  Google Scholar 

  16. Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  17. Galbraith, S., Mao, W., Paterson, K.G.: RSA-based undeniable signatures for general moduli. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 200–217. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Gennaro, R., Krawczyk, H., Rabin, T.: RSA-Based Undeniable Signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 132–149. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  19. Gibbard, A.: Manipulation of Voting Schemes: A General Result. Econometrica 41(4), 587–601 (1973)

    Article  MathSciNet  MATH  Google Scholar 

  20. Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265–282. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  22. Moynihan, D.P.: Building Secure Elections: E-Voting, Security, and Systems Theory. Public Administration Review 64(5), 515–528 (2004)

    Article  Google Scholar 

  23. Naccache, D.: Secure and practical identity-based encryption. IET Image Processing 1(2), 59–64 (2007)

    Google Scholar 

  24. Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  25. Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80–99. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  26. Popoveniuc, S., Hosp, B.: An Introduction to Punchscan (2006) (unpublished draft), http://punchscan.org/papers/popoveniuc_hosp_punchscan_introduction.pdf

  27. Rivest, R.L.: The ThreeBallot voting system (2006) (unpublished draft), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf

  28. Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Prêt à Voter: a Voter-Verifiable Voting System. Trans. Info. For. Sec. 4(4), 662–673 (2009)

    Article  Google Scholar 

  29. Sako, K.: Electronic voting scheme allowing open objection to the tally. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 77(1), 24–30 (1994)

    Google Scholar 

  30. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  31. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gray, D., Sheedy, C. (2011). E-Voting: A New Approach Using Double-Blind Identity-Based Encryption. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22633-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22632-8

  • Online ISBN: 978-3-642-22633-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics