D-DEMOS: A Distributed, End-to-end Verifiable, Internet Voting system

被引:17
|
作者
Chondros, Nikos [1 ]
Zhang, Bingsheng [2 ,3 ]
Zacharias, Thomas [1 ]
Diamantopoulos, Panos [1 ]
Maneas, Stathis [4 ]
Patsonakis, Christos [1 ]
Delis, Alex [1 ]
Kiayias, Aggelos [1 ]
Roussopoulos, Mema [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, GR-10679 Athens, Greece
[2] Univ Lancaster, Sch Comp, Lancaster LA1 4YW, England
[3] Univ Lancaster, Sch Commun, Lancaster LA1 4YW, England
[4] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 1A1, Canada
关键词
D O I
10.1109/ICDCS.2016.56
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
E-voting systems have emerged as a powerful technology for improving democracy by reducing election cost, increasing voter participation, and even allowing voters to directly verify the entire election procedure. Prior internet voting systems have single points of failure, which may result in the compromise of availability, voter secrecy, or integrity of the election results. In this paper, we present the design, implementation, security analysis, and evaluation of D-DEMOS, a complete e-voting system that is distributed, privacy-preserving and end-to-end verifiable. Our system includes a fully asynchronous vote collection subsystem that provides immediate assurance to the voter her vote was recorded as cast, without requiring cryptographic operations on behalf of the voter. We also include a distributed, replicated and fault-tolerant Bulletin Board component, that stores all necessary election-related information, and allows any party to read and verify the complete election process. Finally, we also incorporate trustees, i.e., individuals who control election result production while guaranteeing privacy and end-to-end-verifiability as long as their strong majority is honest. Our system is the first e-voting system whose voting operation is human verifiable, i.e., a voter can vote over the web, even when her web client stack is potentially unsafe, without sacrificing her privacy, and still be assured her vote was recorded as cast. Additionally, a voter can outsource election auditing to third parties, still without sacrificing privacy. Finally, as the number of auditors increases, the probability of election fraud going undetected is diminished exponentially. We provide a model and security analysis of the system. We implement a prototype of the complete system, we measure its performance experimentally, and we demonstrate its ability to handle large-scale elections.
引用
收藏
页码:711 / 720
页数:10
相关论文
共 50 条
  • [31] End-to-end Internet packet dynamics
    Univ of California, Berkeley, Berkeley, United States
    Comput Commun Rev, 4 (139-152):
  • [32] Internet end-to-end delay dynamics
    Zhu Changhua
    JournalofSystemsEngineeringandElectronics, 2006, (03) : 685 - 691
  • [33] End-to-end internet packet dynamics
    Paxson, V
    IEEE-ACM TRANSACTIONS ON NETWORKING, 1999, 7 (03) : 277 - 292
  • [34] End-to-end routing behavior in the Internet
    Paxson, Vern
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (05) : 43 - 56
  • [35] End-to-end Internet packet dynamics
    Network Research Group, Lawrence Berkeley National Laboratory, University of California at Berkeley, Berkeley, CA 94720, United States
    IEEE ACM Trans Networking, 3 (277-292):
  • [36] Distributed End-to-End testing management
    Bai, XY
    Tsai, WT
    Paul, R
    Shen, TC
    Li, B
    FIFTH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2001, : 140 - 151
  • [37] End-to-end Distributed Video Coding
    Zhou, Junwei
    Lv, Ting
    Yi, XiangBo
    DCC 2022: 2022 DATA COMPRESSION CONFERENCE (DCC), 2022, : 496 - 496
  • [38] Voting technology - Election auditing is an end-to-end procedure
    Selker, T
    SCIENCE, 2005, 308 (5730) : 1873 - 1874
  • [39] d-blink: Distributed End-to-End Bayesian Entity Resolution
    Marchant, Neil G.
    Kaplan, Andee
    Elazar, Daniel N.
    Rubinstein, Benjamin I. P.
    Steorts, Rebecca C.
    JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2021, 30 (02) : 406 - 421
  • [40] Framework of end-to-end performance measurement and analysis system for Internet applications
    Kushida, T
    Shibata, Y
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 674 - 679