Abstract:Abstract. Remote electronic voting has attracted increasing attention in cryptographic research. A promising protocol presented by Juels et al. is currently widely discussed. Although it offers a remarkably high degree of coercion-resistance under reasonable assumptions, it can not be employed in practice due to its poor efficiency. The improvements that have been proposed either require stronger trust assumptions or turned out to be insecure. In this paper, we present an enhancement of the protocol, which run… Show more
“…This issue is also present in a family of other protocols that rely on anonymous channels for casting the ballot [3], [39], and extensions designed to solve this problem has been proposed [40], [41]. However, these extensions alter the adversarial model by requiring additional trust assumptions, and neither of them is designed for proxy voting.…”
“…This issue is also present in a family of other protocols that rely on anonymous channels for casting the ballot [3], [39], and extensions designed to solve this problem has been proposed [40], [41]. However, these extensions alter the adversarial model by requiring additional trust assumptions, and neither of them is designed for proxy voting.…”
“…This scheme, however, is unsuited for practical use, due to the fact, that its performance is O(N 2 ) with N as the number of eligible voters. Therefore, a number of works have presented the improvements to the JCJ system, that preserve the coercion-resistance properties while achieving linear complexity -among others, approaches based upon group signatures [2], panic passwords [10], concurrent ballot authorization [15], anonymity sets [34] or using the voter roll [38]. Furthermore, several improvements focused on improving other shortcomings in JCJ scheme, such as addressing the issue of board flooding [26], or improving usability with using tamper-resistant smartcards [29].…”
Abstract. We show how to extend the Helios voting system to provide eligibility verifiability without revealing who voted which we call private eligibility verifiability. The main idea is that real votes are hidden in a crowd of null votes that are cast by others but are indistinguishable from those of the eligible voter. This extended Helios scheme also improves Helios towards receipt-freeness.
“…A number of voting schemes and systems have been proposed [7][8][9][10][11][12]17,30,[35][36][37][38][39][40][41][42][43].…”
Section: Related Work and Comparisonmentioning
confidence: 99%
“…Several online voting solutions [7][8][9][10][11] have been proposed. Some suggest keeping non-electronic parallels of electronic votes, or saving copies of votes in portable storage devices.…”
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we propose a transparent, auditable, stepwise verifiable, viewable, and mutual restraining e-voting protocol that exploits the existing multi-party political dynamics such as in the US. The new e-voting protocol consists of three original technical contributions-universal verifiable voting vector, forward and backward mutual lock voting, and in-process check and enforcement-that, along with a public real time bulletin board, resolves the apparent conflicts in voting such as anonymity vs. accountability and privacy vs. verifiability. Especially, the trust is split equally among tallying authorities who have conflicting interests and will technically restrain each other. The voting and tallying processes are transparent/viewable to anyone, which allow any voter to visually verify that his vote is indeed counted and also allow any third party to audit the tally, thus, enabling open and fair election. Depending on the voting environment, our interactive protocol is suitable for small groups where interaction is encouraged, while the non-interactive protocol allows large groups to vote without interaction.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.