ABSTRACT
Any person can post arbitrary strings on the bulletin board. Following publication on bulletin board, a party receives a "evidence" that the intended data were posted. The bulletin board is open to the public, which means that anyone can view its contents. The fundamental security criteria for a BB are that its contents cannot be deleted, and that no evidence of publication can be falsified. BB was commonly perceived as a trusted and publicly verifiable channel. It formed the backbone of many important protocols such as e-voting, secure multi-party computation etc. and quite often it was assumed to exist to support the execution of the main protocol. After the advent of blockchain technology, BB systems has found a strong footing regarding its implementation in a distributed manner. In this paper, we aim to provide a concise summary of the evolution of bulletin board, its implementation issues and security analysis with an emphasis on its impact to e-voting systems.
Supplemental Material
- Ben Adida. 2008. Helios: Web-based Open-Audit Voting. In USENIX security symposium, Vol. 17. 335--348.Google ScholarDigital Library
- Agora. 2018. Agora Whitepaper. Agora (2018), 46--46.Google Scholar
- Nicholas Akinyokun and Vanessa Teague. 2019. Receipt-Free, Universally and Individually Verifiable Poll Attendance. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3290688.3290696Google ScholarDigital Library
- Craig Burton, Chris Culnane, and Steve Schneider. 2015. Secure and verifiable electronic voting in practice: the use of vvote in the victorian state election. arXiv preprint arXiv:1504.07098 (2015).Google Scholar
- Christian Cachin. 1995. On-line secret sharing. In IMA International Conference on Cryptography and Coding. Springer, 190--198.Google ScholarCross Ref
- Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, and Mema Roussopoulos. 2016. D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System. Proceedings - International Conference on Distributed Computing Systems 2016-Augus (2016), 711--720. https://doi.org/10.1109/ICDCS.2016.56Google ScholarCross Ref
- Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, and Ian Miers. 2017. Fairness in an unfair world: Fair multiparty computation from public bulletin boards. In Proceedings of the 2017 ACM CCS. 719--728.Google ScholarDigital Library
- Michael R. Clarkson, Stephen Chong, and Andrew C. Myers. 2008. Civitas: Toward a secure voting system. 354--368. https://doi.org/10.1109/SP.2008.32Google ScholarDigital Library
- Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. 1997. A secure and optimally efficient multi- authority election scheme. Lecture Notes in Computer Science 1233 (1997), 103--118. https://doi.org/10.1007/3--540--69053_9Google ScholarCross Ref
- Chris Culnane, Peter Y. A. Ryan, Steve Schneider, and Vanessa Teague. 2015. V Vote: A verifiable voting system. ACM Transactions on Information and System Security 18, 1 (2015), 1--30. https://doi.org/10.1145/2746338Google ScholarDigital Library
- Informe Deloitte. 2017. Predicciones sobre tecnología, medios y telecomunicaciones: https://www2.deloitte.com/content/dam/Deloitte/cr/Documents/technology-mediatelecommunications/estudios. TMT-Predictions-2017-spanish. pdf (2017).Google Scholar
- Gianluca Dini. 2003. A secure and available electronic voting service for a largescale distributed system. Future Generation Computer Systems 19, 1 (2003), 69--85. https://doi.org/10.1016/S0167--739X(02)00109--7Google ScholarCross Ref
- Ardalan Farkhondeh. 2019. A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic Networks. CoRR abs/1909.02380 (2019). arXiv:1909.02380 http://arxiv.org/abs/1909.02380Google Scholar
- Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45--58.Google ScholarCross Ref
- James Heather and David Lundin. 2008. The append-only web bulletin board. In InternationalWorkshop on Formal Aspects in Security and Trust. Springer, 242--256.Google Scholar
- Lucca Hirschi, Lara Schmid, and David Basin. 2021. Fixing the achilles heel of e-voting: The bulletin board. In 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 1--17.Google ScholarCross Ref
- Ari Juels, Dario Catalano, and Markus Jakobsson. 2005. Coercion-Resistant Electronic Elections ( Extended Abstract ) Categories and Subject Descriptors. Organization January (2005), 61--70.Google Scholar
- Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, and Thomas Zacharias. 2018. On the security properties of e-voting bulletin boards. In International Conference on Security and Cryptography for Networks. Springer, 505--523.Google ScholarDigital Library
- Aggelos Kiayias, Thomas Zacharias, and Bingsheng Zhang. 2015. End-to-end verifiable elections in the standard model. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 468--498.Google ScholarCross Ref
- Roland Kummenacher. 2010. Implementation of aWeb Bulletin Board for e-voting applications. (2010).Google Scholar
- Bo Meng, Zimao Li, and Jun Qin. 2010. A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme. J. Softw. 5, 9 (2010), 942--949.Google ScholarCross Ref
- RA Peters. 2005. A secure bulletin board. Ph.D. Dissertation. Master's thesis, Technische Universiteit Eindhoven.Google Scholar
- Misni Harjo Suwito and Sabyasachi Dutta. 2019. Verifiable E-Voting with Resistance against Physical Forced Abstention Attack. In 2019 International Workshop on Big Data and Information Security. IEEE, 85--90.Google ScholarCross Ref
- Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, BoWu, and Yunzhe Guo. 2020. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58, 1 (2020), 47--53. https://doi.org/10.1109/MCOM.001.1900130Google ScholarDigital Library
- Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress). IEEE, 557--564.Google Scholar
Index Terms
- A Systematic Study of Bulletin Board and Its Application
Recommendations
On the Security Properties of e-Voting Bulletin Boards
Security and Cryptography for NetworksAbstractIn state-of-the-art e-voting systems, a bulletin board (BB) is a critical component for preserving election integrity and availability. We introduce a framework for the formal security analysis of the BB functionality modeled as a distributed ...
Social Network Analysis Application in Bulletin Board Systems
ISIE '11: Proceedings of the 2011 International Conference on Intelligence Science and Information EngineeringA social network is a map of the relationships between individuals where we can observe their social activities. Conception of centrality comes from structural sociology. It is a fundamental method in the social network analysis. Centrality is a ...
Novel bulletin board system based on document object model and client-side scripting for improved interaction
ICOIN '13: Proceedings of the 2013 International Conference on Information Networking (ICOIN)Web Bulletin Board System has first appeared and provided a space for people to share opinions and information freely on web service. These days, public institutions, the press, firms and even personal internet websites use various types of Bulletin ...
Comments