An efficient multi-receipt mechanism for uncoercible anonymous electronic voting

Despite well-known controversies surrounding electronic voting (e-voting), electronic voting systems are gradually replacing traditional paper-based ones in some developed countries. An anonymous e-voting system that can be used in elections with large electorates must meet various security requirements, such as anonymity, uncoercibility, tally correctness, completeness, unrecastability, verifiability, soundness, and honesty. In particular, the uncoercibility requirement is essential, since systems meeting this requirement can largely reduce the possibility of coercion and bribery in elections. If a voter obtains only one voting receipt in an electronic voting system, coercers or bribers can enforce the voter to show her/his voting receipt to identify whether the enforced voter followed their will or not. However, if a voter can obtain multiple receipts reflecting several possible intentions in an election, coercers cannot distinguish these receipts to decide how the voter actually voted. In this article, we analyze possible venues for successful coercion, and present ideas for developing an effective electronic voting protocol, allowing one to greatly reduce the chances of coercibility. This protocol is independent of the underlying cryptographic components, and it can be easily implemented in electronic voting systems. We use random oracle models to demonstrate that the proposed protocol possesses the necessary security features.

[1]  P. Ryan The Computer Ate My Vote , 2010 .

[2]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[3]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[4]  Mark Ryan,et al.  Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[5]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[6]  Josh Benaloh,et al.  Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.

[7]  Warren D. Smith Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.

[8]  Jacques Stern,et al.  Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.

[9]  Chin-Laung Lei,et al.  A collision-free secret ballot protocol for computerized general elections , 1996, Comput. Secur..

[10]  Horng-Twu Liaw,et al.  A secure electronic voting protocol for general elections , 2004, Comput. Secur..

[11]  Chin-Laung Lei,et al.  An unlinkably divisible and intention attachable ticket scheme for runoff elections , 2002, J. Netw. Comput. Appl..

[12]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[13]  Emmanouil Magkos,et al.  Receipt-Freeness in Large-Scale Elections without Untappable Channels , 2001, I3E.

[14]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[15]  Jacques Stern,et al.  Security Proofs for Signature Schemes , 1996, EUROCRYPT.

[16]  Chun-I Fan,et al.  Robust remote authentication scheme with smart cards , 2005, Comput. Secur..

[17]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[18]  Sheng-De Wang,et al.  A secure and practical electronic voting scheme , 1999, Comput. Commun..

[19]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[20]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[21]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[22]  Jinn-Ke Jan,et al.  A secure electronic voting protocol with IC cards , 1995, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology.

[23]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[24]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[25]  Chin-Chen Chang,et al.  Hybrid method for modular exponentiation with precomputation , 1996 .

[26]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[27]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[28]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[29]  Rafail Ostrovsky,et al.  Security of blind digital signatures , 1997 .

[30]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[31]  Tatsuaki Okamoto,et al.  Provably Secure Partially Blind Signatures , 2000, CRYPTO.

[32]  Chun-I Fan,et al.  Remote Password Authentication Scheme with Smart Cards and Biometrics 12 , 2006 .

[33]  Chin-Laung Lei,et al.  A Universal Single-Authority Election System , 1998 .

[34]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[35]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[36]  Chun-I Fan,et al.  Improved low-computation partially blind signatures , 2003, Appl. Math. Comput..

[37]  Chin-Laung Lei,et al.  A Multi-Recastable Ticket Scheme for Electronic Elections , 1996, ASIACRYPT.

[38]  Chin-Chen Chang,et al.  An anonymous voting mechanism based on the key exchange protocol , 2006, Comput. Secur..

[39]  Chin-Laung Lei,et al.  Multi-Recastable Ticket Schemes for Electronic Voting , 1998 .

[40]  Chin-Laung Lei,et al.  User efficient blind signatures , 1998 .

[41]  Chun-I Fan,et al.  An Efficient Blind Signature Scheme for Information Hiding , 2001, Int. J. Electron. Commer..