Quantitative Anonymity Evaluation of Voting Protocols

被引:1
|
作者
Biondi, Fabrizio [1 ]
Legay, Axel [1 ]
机构
[1] INRIA Rennes, Rennes, France
关键词
D O I
10.1007/978-3-319-15201-1_22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In an election, it is imperative that the vote of the single voters remain anonymous and undisclosed. Alas, modern anonymity approaches acknowledge that there is an unavoidable leak of anonymity just by publishing data related to the secret, like the election's result. Information theory is applied to quantify this leak and ascertain that it remains below an acceptable threshold. We apply modern quantitative anonymity analysis techniques via the state-of-the-art QUAIL tool to the voting scenario. We consider different voting typologies and establish which are more effective in protecting the voter's privacy. We further demonstrate the effectiveness of the protocols in protecting the privacy of the single voters, deriving an important desirable property of protocols depending on composite secrets.
引用
收藏
页码:335 / 349
页数:15
相关论文
共 50 条
  • [1] Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity
    Shi, Yijie
    Fan, Kai
    Bai, Yuhan
    Zhang, Chonglin
    Yang, Kan
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 3163 - 3176
  • [2] Secrecy forever? Analysis of anonymity in Internet-based voting protocols
    Volkamer, Melanie
    Krimmer, Robert
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 340 - +
  • [3] Anonymity in Voting Revisited
    Jonker, Hugo
    Pieters, Wolter
    TOWARDS TRUSTWORTHY ELECTIONS: NEW DIRECTIONS IN ELECTRONIC VOTING, 2010, 6000 : 216 - +
  • [4] Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-based Voting Protocols
    Talbi, Mehdi
    Tong, Valerie Viet Triem
    Bouhoula, Adel
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 281 - +
  • [5] Evaluation of anonymity and confidentiality protocols using theorem proving
    Mhamdi, Tarek
    Hasan, Osman
    Tahar, Sofiene
    FORMAL METHODS IN SYSTEM DESIGN, 2015, 47 (03) : 265 - 286
  • [6] Evaluation of anonymity and confidentiality protocols using theorem proving
    Tarek Mhamdi
    Osman Hasan
    Sofiène Tahar
    Formal Methods in System Design, 2015, 47 : 265 - 286
  • [7] Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
    Kulyk, Oksana
    Neumann, Stephan
    Budurushi, Jurlind
    Volkamer, Melanie
    Haenni, Rolf
    Koenig, Reto
    von Bergen, Philemon
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 224 - 229
  • [8] Anonymity in classroom voting and debating
    Ainsworth, Shaaron
    Gelmini-Hornsby, Giulia
    Threapleton, Kate
    Crook, Charles
    O'Malley, Claire
    Buda, Marie
    LEARNING AND INSTRUCTION, 2011, 21 (03) : 365 - 378
  • [9] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [10] Anonymity Protocols as noisy channels
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    Panangaden, Prakash
    TRUSTWORTHY GLOBAL COMPUTING, 2007, 4661 : 281 - +