Abstract
We present a new cryptographic construction, double-blind identity-based encryption (DB-IBE). In standard IBE, the identity string that is passed to a key generation centre (\(\mathcal{KGC}\) ) during the key extraction phase is visible to the \(\mathcal{KGC}\) . Recent work introduced the idea of blinding the identity string, resulting in a blind IBE scheme which obscures the identity string from a \(\mathcal{KGC}\) . Double-blind IBE schemes, which are extensions of blind IBE schemes, allow a user to construct an identity string that is partially obscured from the \(\mathcal{KGC}\) , while also facilitating the \(\mathcal{KGC}\) adding elements to the identity string which are obscured from the user. Using DB-IBE, we present an e-voting scheme with desirable features such as universal verifiability, voter verifiability and receipt-freeness.
The authors thank Science Foundation Ireland (SFI) for support under grant 08/RFP/CMS1347.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adida, B., Neff, C.A.: Ballot casting assurance. In: EVT 2006, Proceedings of the First Usenix/ACCURATE Electronic Voting Technology Workshop, Vancouver, BC, Canada, August 1 (2006)
Adida, B., Rivest, R.L.: Scratch & vote: self-contained paper-based cryptographic voting. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 29–40. ACM, New York (2006)
Anane, R., Freeland, R., Theodoropoulos, G.: e-Voting Requirements and Implementation. In: The 9th IEEE International Conference on E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, CEC/EEE 2007, pp. 382–392 (2007)
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 544–553. ACM, New York (1994)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196–214. Springer, Heidelberg (2009)
Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Advances in Cryptology (CRYPTO 1983). LNCS, vol. 82, pp. 23–25 (1982)
Chaum, D.: Zero-knowledge undeniable signatures. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 458–464. Springer, Heidelberg (1991)
Chaum, D.: Designated confirmer signatures. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 86–91. Springer, Heidelberg (1995)
Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy Magazine 2(1), 38–47 (2004)
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–90 (1981)
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
Delaune, S., Kremer, S., Ryan, M.: Verifying Properties of Electronic-Voting Protocols. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), pp. 45–52 (2006)
Dini, G.: A secure and available electronic voting service for a large-scale distributed system. Future Generation Computer Systems 19(1), 69–85 (2003)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Galbraith, S., Mao, W., Paterson, K.G.: RSA-based undeniable signatures for general moduli. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 200–217. Springer, Heidelberg (2002)
Gennaro, R., Krawczyk, H., Rabin, T.: RSA-Based Undeniable Signatures. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 132–149. Springer, Heidelberg (1997)
Gibbard, A.: Manipulation of Voting Schemes: A General Result. Econometrica 41(4), 587–601 (1973)
Green, M., Hohenberger, S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 265–282. Springer, Heidelberg (2007)
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)
Moynihan, D.P.: Building Secure Elections: E-Voting, Security, and Systems Theory. Public Administration Review 64(5), 515–528 (2004)
Naccache, D.: Secure and practical identity-based encryption. IET Image Processing 1(2), 59–64 (2007)
Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998)
Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80–99. Springer, Heidelberg (2006)
Popoveniuc, S., Hosp, B.: An Introduction to Punchscan (2006) (unpublished draft), http://punchscan.org/papers/popoveniuc_hosp_punchscan_introduction.pdf
Rivest, R.L.: The ThreeBallot voting system (2006) (unpublished draft), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Prêt à Voter: a Voter-Verifiable Voting System. Trans. Info. For. Sec. 4(4), 662–673 (2009)
Sako, K.: Electronic voting scheme allowing open objection to the tally. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 77(1), 24–30 (1994)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gray, D., Sheedy, C. (2011). E-Voting: A New Approach Using Double-Blind Identity-Based Encryption. In: Camenisch, J., Lambrinoudakis, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2010. Lecture Notes in Computer Science, vol 6711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22633-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-22633-5_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22632-8
Online ISBN: 978-3-642-22633-5
eBook Packages: Computer ScienceComputer Science (R0)