We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities. All protocols have polynomial complexity and require private channels and a simultaneous broadcast channel. Our first protocol is a basic voting scheme which allows voters to interact in order to compute the tally. Privacy of the ballot is unconditional, but any voter can cause the protocol to fail, in which case information about the tally may nevertheless transpire. Our second protocol introduces voting authorities which allow the implementation of the first protocol, while reducing the interaction and limiting it to be only between voters and authorities and among the authorities themselves. The simultaneous broadcast is also limited to the authorities. As long as a single authority is honest, the privacy is unconditional, however, a single corrupt authority or a single corrupt voter can cause the protocol to fail. Our final protocol provides a safeguard against corrupt voters by enabling a verification technique to allow the authorities to revoke incorrect votes. We also discuss the implementation of a simultaneous broadcast channel with the use of temporary computational assumptions, yielding versions of our protocols achieving everlasting security.
[1]
David Chaum,et al.
The dining cryptographers problem: Unconditional sender and recipient untraceability
,
1988,
Journal of Cryptology.
[2]
David Chaum,et al.
Multiparty unconditionally secure protocols
,
1988,
STOC '88.
[3]
Avi Wigderson,et al.
Completeness theorems for non-cryptographic fault-tolerant distributed computation
,
1988,
STOC '88.
[4]
Adrian Kent,et al.
Unconditionally Secure Bit Commitment
,
1998,
quant-ph/9810068.
[5]
Daniele Micciancio,et al.
Simultaneous broadcast revisited
,
2005,
PODC '05.
[6]
Tal Rabin,et al.
Verifiable secret sharing and multiparty protocols with honest majority
,
1989,
STOC '89.
[7]
Alain Tapp,et al.
Information-Theoretic Security Without an Honest Majority
,
2007,
ASIACRYPT.
[8]
Baruch Awerbuch,et al.
Verifiable secret sharing and achieving simultaneity in the presence of faults
,
1985,
26th Annual Symposium on Foundations of Computer Science (sfcs 1985).