Pretty Good Democracy

Code voting seeks to address the issues of privacy and integrity for Remote Internet Voting. It sidesteps many of the inherent vulnerabilities of the Internet and client platforms but it does not provide end-to-end verification that votes are counted as cast. In this paper, we propose a simple technique to enhance the verifiability of code voting by ensuring that the Vote Server can only access the acknowledgement codes if the vote code is correctly registered by a threshold set of Trustees. The mechanism proposed here therefore adds an extra level of verifiability in registering and counting the vote. Voter-verification is simple and direct: the voters need only check that the acknowledgement code returned to them agrees with the value on their code sheet. To ensure receipt-freeness we propose the use of a single acknowledgement code per code sheet, rather than individual acknowledgement codes for each candidate with usual code voting.

[1]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[2]  Andrew C. Myers,et al.  Civitas: A Secure Remote Voting System , 2007, Frontiers of Electronic Voting.

[3]  Pei-Yih Ting,et al.  Distributed Paillier Plaintext Equivalence Test , 2008, Int. J. Netw. Secur..

[4]  Jean-Jacques Quisquater,et al.  Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.

[5]  Markus Jakobsson,et al.  Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.

[6]  C. Andrew Neff,et al.  A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.

[7]  Jeremy Clark,et al.  Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.

[8]  Jörg Schwenk,et al.  Code Voting with Linkable Group Signatures , 2008, Electronic Voting.

[9]  Hugo Krawczyk,et al.  Adaptive Security for Threshold Cryptosystems , 1999, CRYPTO.

[10]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[11]  Ben Adida,et al.  Advances in cryptographic voting systems , 2006 .

[12]  P. Ryan The Computer Ate My Vote , 2010 .

[13]  Taisya Krivoruchko Robust Coercion-Resistant Registration for Remote E-voting ( Extended Abstract ) , 2007 .

[14]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[15]  Peter Y. A. Ryan,et al.  Computing Science Pret a Voter with Paillier Encryption Pret a Voter with Paillier Encryption Bibliographical Details Pret a Voter with Paillier Encryption Suggested Keywords Prêtà Voter with Paillier Encryption , 2007 .

[16]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[17]  Josh Benaloh,et al.  Simple Verifiable Elections , 2006, EVT.

[18]  Rolf Oppliger,et al.  Protecting Code Voting Against Vote Selling , 2008, Sicherheit.

[19]  Peter Y. A. Ryan,et al.  Ballot permutations in prêt à voter , 2009 .

[20]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[21]  Bev Littlewood,et al.  E-voting: dependability requirements and design for dependability , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[22]  Markus Jakobsson,et al.  Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.

[23]  Peter Y. A. Ryan,et al.  Prêt à Voter with Re-encryption Mixes , 2006, ESORICS.

[24]  Jeremy Clark,et al.  How to print a secret , 2009 .

[25]  Melanie Volkamer,et al.  Multiple Casts in Online Voting: Analyzing Chances , 2006, Electronic Voting.