2013
DOI: 10.1007/978-3-642-40203-6_27
|View full text |Cite
|
Sign up to set email alerts
|

Election Verifiability or Ballot Privacy: Do We Need to Choose?

Abstract: Abstract. We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this primitive that enable building the first universally verifiable voting schemes with a perfectly private audit trail (PPAT) and practical complexity. That is:-the audit trail that is published for verifying elections guarantees everlasting privacy, and -the computational load required from the participants is only increased by a small constant factor compared to traditional voting schemes, and is optim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(80 citation statements)
references
References 34 publications
0
79
0
1
Order By: Relevance
“…Game-based privacy [23], [24], [25], [12], [18], [19], [26], [22], [20], [21] (our terminology) definitions require that it should be hard for an adversary to win a game with a challenger behaving in a fully specified manner, in the spirit of traditional indistinguishability definitions for encryption. In this section we review the most relevant ballot privacy definitions in the literature.…”
Section: Survey and Analysis Of Previous Game-based Computationamentioning
confidence: 99%
See 2 more Smart Citations
“…Game-based privacy [23], [24], [25], [12], [18], [19], [26], [22], [20], [21] (our terminology) definitions require that it should be hard for an adversary to win a game with a challenger behaving in a fully specified manner, in the spirit of traditional indistinguishability definitions for encryption. In this section we review the most relevant ballot privacy definitions in the literature.…”
Section: Survey and Analysis Of Previous Game-based Computationamentioning
confidence: 99%
“…Recently, Cuvelier, Pereira and Peters [26] proposed a variant of the BPRIV1 setting/definition to capture ballot privacy even in the presence of computationally unbounded adversaries, and which is named perfectly private audit trail (PPAT). Similarly to BPRIV1, the definition PPAT is limited in the sense that an adversary is not allowed to see the auxiliary data Π.…”
Section: Definition 1 (Ind-bb)mentioning
confidence: 99%
See 1 more Smart Citation
“…Privacidad eterna del voto (Moran & Naor, 2010;Demirel, Graaf & Araújo, 2012;Buchmann, Demirel & van de Graaf, 2013;Cuvelier, Pereira & Peters, 2013).…”
Section: Conclusionesunclassified
“…These systems have computational verifiability instead of perfect verifiability, and are considered less usable and computationally more expensive than systems relying on encryptions. More recently, schemes have been proposed with a weaker form of everlasting privacy (e.g., [10,12]); they rely on encryptions for counting votes, but use commitments rather than encryptions for verifiability purposes. Thus, the bulletin board which only publishes the commitments does not weaken the privacy provided by the underlying scheme.…”
Section: Introductionmentioning
confidence: 99%