Towards A Practical JCJ / Civitas Implementation

Internet voting continues to enjoy wide interest from both research and practice. Among the Internet voting schemes developed over the last decades, JCJ / Civitas stands out from the masses due to its innovative approach to resist voter coercion. To achieve its ambitious goal, the scheme builds upon particularly restrictive assumptions and an abstract credential handling rendering the scheme impractical for real-world use. At ARES 2012, Neumann and Volkamer presented a proposal which implements several of these assumptions (voter-side assumptions) and the credential handling by the use of smart cards. While addressing these practical shortcomings of JCJ / Civitas, their proposal did not take performance into account, and accordingly its performance has not been evaluated. In the present work, we revise the ARES proposal from a performance perspective in a security-invariant manner. Based on the herein proposed revisions, we are able to conclude that the revised ARES proposal is feasible to be used in real-world elections.

[1]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[2]  Michael R. Clarkson,et al.  Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[3]  Stephan Neumann,et al.  Pretty Understandable Democracy 2.0 , 2014, IACR Cryptol. ePrint Arch..

[4]  Melanie Volkamer,et al.  Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.

[5]  Rolf Haenni,et al.  Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes , 2011, SEC.

[6]  Cormac Herley,et al.  A large-scale study of web password habits , 2007, WWW '07.

[7]  Rolf Haenni,et al.  A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes , 2013, Comput. Secur..

[8]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[9]  Rolf Haenni,et al.  How to Store some Secrets , 2012, IACR Cryptol. ePrint Arch..

[10]  Melanie Volkamer,et al.  Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme , 2013, 2013 International Conference on Availability, Reliability and Security.

[11]  João Mendes Trusted Civitas: Client Trust in CIVITAS Electronic Voting Protocol , 2011 .

[12]  S.J. Aboud,et al.  Baghdad method for calculating multiplicative inverse , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[13]  Mark Ryan,et al.  Towards Automatic Analysis of Election Verifiability Properties , 2010, ARSPA-WITS.

[14]  Johannes A. Buchmann,et al.  On Coercion-Resistant Electronic Elections with Linear Work , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[15]  Michael Backes,et al.  Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[16]  Josh Benaloh,et al.  Simple Verifiable Elections , 2006, EVT.

[17]  Ralf Küsters,et al.  An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[18]  Jan Camenisch,et al.  Anonymous credentials on a standard java card , 2009, CCS.

[19]  Mark Ryan,et al.  Trivitas: Voters Directly Verifying Votes , 2011, VoteID.

[20]  Melanie Volkamer,et al.  Civitas and the Real World: Problems and Solutions from a Practical Point of View , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[21]  Warren D. Smith New cryptographic election protocol with best-known theoretical properties , 2005 .

[22]  Rolf Haenni,et al.  A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time , 2011, Financial Cryptography.

[23]  Jacques Traoré,et al.  A Practical and Secure Coercion-Resistant Scheme for Internet Voting , 2010, Towards Trustworthy Elections.

[24]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..