Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme

被引:4
|
作者
Haines, Thomas [1 ]
Pattinson, Dirk [2 ]
Tiwari, Mukesh [2 ]
机构
[1] NTNU, Trondheim, Norway
[2] Australian Natl Univ, Res Sch Comp Sci, Canberra, ACT, Australia
关键词
PROOFS;
D O I
10.1007/978-3-030-41600-3_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The encryption of ballots is crucial to maintaining integrity and anonymity in electronic voting schemes. It enables, amongst other things, each voter to verify that their encrypted ballot has been recorded as cast, by checking their ballot against a bulletin board. We present a verifiable homomorphic tallying scheme for the Schulze method that allows verification of the correctness of the count-on the basis of encrypted ballots-that only reveals the final tally. We achieve verifiability by using zero knowledge proofs for ballot validity and honest decryption of the final tally. Our formalisation takes places inside the Coq theorem prover and is based on an axiomatisation of cryptogtaphic primitives, and our main result is the correctness of homomorphic tallying. We then instantiate these primitives using an external library and show the feasibility of our approach by means of case studies.
引用
收藏
页码:36 / 53
页数:18
相关论文
共 50 条
  • [1] A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme
    Bian, Zhaoxuan
    Wang, Fuqun
    Zhang, Renjun
    Lian, Bin
    Han, Lidong
    Chen, Kefei
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [2] COMPUTERIZED VOTE-TALLYING
    VANANTWERP, M
    COMMUNICATIONS OF THE ACM, 1989, 32 (02) : 172 - 172
  • [3] DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
    Shahandashti, Siamak F.
    Hao, Feng
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 223 - 240
  • [4] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [5] A verifiable fully homomorphic encryption scheme to secure big data in cloud computing
    El-Yahyaoui, Ahmed
    Ech-Chrif El Kettani, Mohamed Dafir
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 250 - 254
  • [6] Privacy preserving verifiable federated learning scheme using blockchain and homomorphic encryption
    Mahato, Ganesh Kumar
    Banerjee, Aiswaryya
    Chakraborty, Swarnendu Kumar
    Gao, Xiao-Zhi
    APPLIED SOFT COMPUTING, 2024, 167
  • [7] Multikey Verifiable Homomorphic Encryption
    Lu, Yi
    Hara, Keisuke
    Tanaka, Keisuke
    IEEE ACCESS, 2022, 10 : 84761 - 84775
  • [8] Verifiable Rotation of Homomorphic Encryptions
    de Hoogh, Sebastiaan
    Schoenmakers, Berry
    Skoric, Boris
    Villegas, Jose
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 393 - 410
  • [9] Homomorphic RSA Tallying and Its Randomization for e-Voting
    Yucel, Okan
    Baykal, Nazife
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2010, : 160 - 167
  • [10] Verifiable Anonymous Vote Submission
    Zuquete, Andre
    Almeida, Filipe
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2159 - 2166