Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption by Joy

Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption. This thesis proposes adding voter verification to an existing multi-candidate election scheme (Baudron et al.) that uses Paillier encryption. A "cut and choose" protocol provides a probabilistic guarantee of correctness. The scheme is straightforward, and could easily be extended to multi-authority elections. The feasibility of the proposed scheme is demonstrated via a simple implementation. Thesis Supervisor: Ronald L. Rivest Title: Viterbi Professor of Computer Science

[1]  Jennings Jt,et al.  Voting and registration in the election of November 1982. , 1982 .

[2]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[3]  Markus Jakobsson,et al.  Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.

[4]  Jacques Stern,et al.  Practical multi-candidate election system , 2001, PODC '01.

[5]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[6]  Ted Selker Testimony on Voter Verification , 2005 .

[7]  Peter Y. A. Ryan,et al.  A Dependability Analysis of the Chaum Digital Voting Scheme , 2003 .

[8]  P. Ryan,et al.  A Simplified Version of the Chaum Voting Scheme , 2004 .

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  C. A. Neff Verifiable Mixing (Shuffling) of ElGamal Pairs , 2004 .

[11]  C. Andrew Ne,et al.  Practical high certainty intent verification for encrypted votes , 2004 .

[12]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[13]  Aggelos Kiayias,et al.  The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.

[14]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[15]  Dan S. Wallach,et al.  Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.

[16]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[17]  Rebecca T. Mercuri A better ballot box , 2002 .