skip to main content
10.1145/3488932.3527280acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

A Systematic Study of Bulletin Board and Its Application

Published:30 May 2022Publication History

ABSTRACT

Any person can post arbitrary strings on the bulletin board. Following publication on bulletin board, a party receives a "evidence" that the intended data were posted. The bulletin board is open to the public, which means that anyone can view its contents. The fundamental security criteria for a BB are that its contents cannot be deleted, and that no evidence of publication can be falsified. BB was commonly perceived as a trusted and publicly verifiable channel. It formed the backbone of many important protocols such as e-voting, secure multi-party computation etc. and quite often it was assumed to exist to support the execution of the main protocol. After the advent of blockchain technology, BB systems has found a strong footing regarding its implementation in a distributed manner. In this paper, we aim to provide a concise summary of the evolution of bulletin board, its implementation issues and security analysis with an emphasis on its impact to e-voting systems.

Skip Supplemental Material Section

Supplemental Material

ASIA-CCS22-misnisuwito.mp4

mp4

26 MB

References

  1. Ben Adida. 2008. Helios: Web-based Open-Audit Voting. In USENIX security symposium, Vol. 17. 335--348.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Agora. 2018. Agora Whitepaper. Agora (2018), 46--46.Google ScholarGoogle Scholar
  3. Nicholas Akinyokun and Vanessa Teague. 2019. Receipt-Free, Universally and Individually Verifiable Poll Attendance. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3290688.3290696Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Craig Burton, Chris Culnane, and Steve Schneider. 2015. Secure and verifiable electronic voting in practice: the use of vvote in the victorian state election. arXiv preprint arXiv:1504.07098 (2015).Google ScholarGoogle Scholar
  5. Christian Cachin. 1995. On-line secret sharing. In IMA International Conference on Cryptography and Coding. Springer, 190--198.Google ScholarGoogle ScholarCross RefCross Ref
  6. Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, and Mema Roussopoulos. 2016. D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System. Proceedings - International Conference on Distributed Computing Systems 2016-Augus (2016), 711--720. https://doi.org/10.1109/ICDCS.2016.56Google ScholarGoogle ScholarCross RefCross Ref
  7. Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, and Ian Miers. 2017. Fairness in an unfair world: Fair multiparty computation from public bulletin boards. In Proceedings of the 2017 ACM CCS. 719--728.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Michael R. Clarkson, Stephen Chong, and Andrew C. Myers. 2008. Civitas: Toward a secure voting system. 354--368. https://doi.org/10.1109/SP.2008.32Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. 1997. A secure and optimally efficient multi- authority election scheme. Lecture Notes in Computer Science 1233 (1997), 103--118. https://doi.org/10.1007/3--540--69053_9Google ScholarGoogle ScholarCross RefCross Ref
  10. Chris Culnane, Peter Y. A. Ryan, Steve Schneider, and Vanessa Teague. 2015. V Vote: A verifiable voting system. ACM Transactions on Information and System Security 18, 1 (2015), 1--30. https://doi.org/10.1145/2746338Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Informe Deloitte. 2017. Predicciones sobre tecnología, medios y telecomunicaciones: https://www2.deloitte.com/content/dam/Deloitte/cr/Documents/technology-mediatelecommunications/estudios. TMT-Predictions-2017-spanish. pdf (2017).Google ScholarGoogle Scholar
  12. Gianluca Dini. 2003. A secure and available electronic voting service for a largescale distributed system. Future Generation Computer Systems 19, 1 (2003), 69--85. https://doi.org/10.1016/S0167--739X(02)00109--7Google ScholarGoogle ScholarCross RefCross Ref
  13. Ardalan Farkhondeh. 2019. A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic Networks. CoRR abs/1909.02380 (2019). arXiv:1909.02380 http://arxiv.org/abs/1909.02380Google ScholarGoogle Scholar
  14. Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45--58.Google ScholarGoogle ScholarCross RefCross Ref
  15. James Heather and David Lundin. 2008. The append-only web bulletin board. In InternationalWorkshop on Formal Aspects in Security and Trust. Springer, 242--256.Google ScholarGoogle Scholar
  16. Lucca Hirschi, Lara Schmid, and David Basin. 2021. Fixing the achilles heel of e-voting: The bulletin board. In 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 1--17.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ari Juels, Dario Catalano, and Markus Jakobsson. 2005. Coercion-Resistant Electronic Elections ( Extended Abstract ) Categories and Subject Descriptors. Organization January (2005), 61--70.Google ScholarGoogle Scholar
  18. Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, and Thomas Zacharias. 2018. On the security properties of e-voting bulletin boards. In International Conference on Security and Cryptography for Networks. Springer, 505--523.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Aggelos Kiayias, Thomas Zacharias, and Bingsheng Zhang. 2015. End-to-end verifiable elections in the standard model. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 468--498.Google ScholarGoogle ScholarCross RefCross Ref
  20. Roland Kummenacher. 2010. Implementation of aWeb Bulletin Board for e-voting applications. (2010).Google ScholarGoogle Scholar
  21. Bo Meng, Zimao Li, and Jun Qin. 2010. A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme. J. Softw. 5, 9 (2010), 942--949.Google ScholarGoogle ScholarCross RefCross Ref
  22. RA Peters. 2005. A secure bulletin board. Ph.D. Dissertation. Master's thesis, Technische Universiteit Eindhoven.Google ScholarGoogle Scholar
  23. Misni Harjo Suwito and Sabyasachi Dutta. 2019. Verifiable E-Voting with Resistance against Physical Forced Abstention Attack. In 2019 International Workshop on Big Data and Information Security. IEEE, 85--90.Google ScholarGoogle ScholarCross RefCross Ref
  24. Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, BoWu, and Yunzhe Guo. 2020. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58, 1 (2020), 47--53. https://doi.org/10.1109/MCOM.001.1900130Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress). IEEE, 557--564.Google ScholarGoogle Scholar

Index Terms

  1. A Systematic Study of Bulletin Board and Its Application

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
            May 2022
            1291 pages
            ISBN:9781450391405
            DOI:10.1145/3488932

            Copyright © 2022 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 May 2022

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            Overall Acceptance Rate418of2,322submissions,18%
          • Article Metrics

            • Downloads (Last 12 months)36
            • Downloads (Last 6 weeks)2

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader