2021
DOI: 10.1145/3450144
|View full text |Cite
|
Sign up to set email alerts
|

Definitions and Security of Quantum Electronic Voting

Abstract: Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 49 publications
(71 reference statements)
0
10
0
Order By: Relevance
“…[15] proposed a new quantum election protocol that, besides fulfilling the typical requirements, also satisfies the receipt-freeness property. An interesting critique regarding quantum voting protocols is found in [16], highlighting the lack of rigor in terms of definitions and proofs used to ascertain their security and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…[15] proposed a new quantum election protocol that, besides fulfilling the typical requirements, also satisfies the receipt-freeness property. An interesting critique regarding quantum voting protocols is found in [16], highlighting the lack of rigor in terms of definitions and proofs used to ascertain their security and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Even if the encrypted information is stored, no future advances in computational power will enable its decoding. This observation has spurred active development of quantum voting protocols, see, e.g., [10] for a recent review. However, existing approaches are either inefficient or do not satisfy all desirable security criteria.…”
Section: Anonymitymentioning
confidence: 99%
“…explored the use of distributed entangled states to compute the voting function, their security is not rigorously established, especially in practical settings. For instance, quantum communication that is exponential in the number of voters is required to prevent doublevoting [10,13].…”
Section: Fig 1 Overview Of the Voting Protocol (A) A Tallymanmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum versions of Merlin-Arthur protocols [6,7] require transmission of quantum information between differently capable agents: Merlin, a wizard, can magically produce quantum proofs and send them to Arthur, a human, who might hope to verify the proofs with the aid of a quantum computer. Another potential multi-agent scenario is information theoretically secure quantum voting [8,9]. When multiple agents are involved, phenomena related to their coordination, cooperation, and even competition may become nontrivial.…”
Section: Introductionmentioning
confidence: 99%