Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. Secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.

[1]  Douglas Wikstr How to Implement a Stand-alone Verifier for the Verificatum Mix-Net , 2012 .

[2]  Alfred Menezes,et al.  On reusing ephemeral keys in Diffie-Hellman key agreement protocols , 2010, Int. J. Appl. Cryptogr..

[3]  Dalia Khader,et al.  Studying Boardroom E-Voting Schemes: Usability and Trust , 2013 .

[4]  Aggelos Kiayias,et al.  Self-tallying Elections and Perfect Ballot Secrecy , 2002, Public Key Cryptography.

[5]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[6]  Walter A. Burkhard,et al.  Proceedings of the fourteenth annual ACM symposium on Theory of computing , 1982 .

[7]  Feng Hao,et al.  A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.

[8]  Melanie Volkamer,et al.  A Holistic Framework for the Evaluation of Internet Voting Systems , 2014 .

[9]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[10]  Torben P. Pedersen,et al.  Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem , 1992 .

[11]  Nancy A. Lynch,et al.  Cryptographic protocols , 1982, STOC '82.

[12]  R. Michael Alvarez,et al.  From piloting to roll-out: voting experience and trust in the first full e-election in Argentina , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).

[13]  Melanie Volkamer,et al.  Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.

[14]  Jens Groth,et al.  Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast , 2004, Financial Cryptography.

[15]  Douglas Wikström,et al.  Proofs of Restricted Shuffles , 2010, AFRICACRYPT.

[16]  Adrian Perrig,et al.  SafeSlinger: easy-to-use and secure public-key exchange , 2013, MobiCom.

[17]  Josh Benaloh,et al.  Simple Verifiable Elections , 2006, EVT.

[18]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[19]  Jens Groth,et al.  Non-interactive Zero-Knowledge Arguments for Voting , 2005, ACNS.

[20]  Melanie Volkamer,et al.  Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting , 2011, VoteID.

[21]  Véronique Cortier,et al.  A generic construction for voting correctness at minimum cost - Application to Helios , 2013, IACR Cryptol. ePrint Arch..

[22]  Ben Smyth,et al.  Ballot Secrecy and Ballot Independence Coincide , 2013, ESORICS.

[23]  Robert Sedgewick,et al.  Proceedings of the seventeenth annual ACM symposium on Theory of computing , 1985, STOC 1985.

[24]  Miguel Correia,et al.  Efficient Byzantine-resilient reliable multicast on a hybrid failure model , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[25]  Melanie Volkamer,et al.  Electronic voting with fully distributed trust and maximized flexibility regarding ballot design , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).

[26]  Josh Benaloh Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.

[27]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[28]  Melanie Volkamer,et al.  Online-Wahlen fr Gremien , 2005 .

[29]  Melanie Volkamer,et al.  Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.

[30]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[31]  Feng Hao,et al.  Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..

[32]  Ronald Cramer,et al.  A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..

[33]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.