Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election

Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifiable, viewable, and mutual restraining e-voting protocol that exploits the existing multi-party political dynamics such as in the US. The new e-voting protocol consists of three original technical contributions—universal verifiable voting vector, forward and backward mutual lock voting, and in-process check and enforcement—that, along with a public real time bulletin board, resolves the apparent conflicts in voting such as anonymity vs. accountability and privacy vs. verifiability. Especially, the trust is split equally among tallying authorities who have conflicting interests and will technically restrain each other. The voting and tallying processes are transparent/viewable to anyone, which allow any voter to visually verify that his vote is indeed counted and also allow any third party to audit the tally, thus, enabling open and fair election. Depending on the voting environment, our interactive protocol is suitable for small groups where interaction is encouraged, while the non-interactive protocol allows large groups to vote without interaction.

[1]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[2]  Philip B. Stark,et al.  STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System , 2012, EVT/WOTE.

[3]  Pascal Lafourcade,et al.  Survey on Electronic Voting Schemes , 2010 .

[4]  Melanie Volkamer,et al.  Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.

[5]  Warren D. Smith Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.

[6]  Stefan Weber,et al.  A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation , 2006 .

[7]  Douglas W. Jones,et al.  Broken Ballots: Will Your Vote Count? , 2012 .

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Josh Benaloh,et al.  Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.

[10]  David Pointcheval,et al.  On Some Incompatible Properties of Voting Schemes , 2010, Towards Trustworthy Elections.

[11]  David A. Wagner,et al.  Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.

[12]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[13]  Byoungcheon Lee,et al.  Experimental Design of Worldwide Internet Voting System using PKI , 2001 .

[14]  Jeremy Clark,et al.  Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.

[15]  Peter Y. A. Ryan,et al.  Prêt à Voter : a Systems Perspective , 2005 .

[16]  Colin Boyd,et al.  A New Multiple Key Cipher and an Improved Voting Scheme , 1990, EUROCRYPT.

[17]  Bryan Alexander Campbell The Usability Implications of Long Ballot Content for Paper, Electronic, and Mobile Voting Systems , 2013 .

[18]  Michael J. Radwin An untraceable , universally verifiable voting scheme , 1997 .

[19]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[20]  R. Rivest The ThreeBallot Voting System , 2006 .

[21]  Aggelos Kiayias,et al.  An Internet Voting System Supporting User Privacy , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[22]  Stefan Popoveniuc,et al.  An Introduction to PunchScan , 2010, Towards Trustworthy Elections.

[23]  Alan T. Sherman,et al.  Punchscan: Introduction and System Definition of a High-Integrity Election System , 2006 .

[24]  Min-Shiang Hwang,et al.  Security Enhancement of Chang-Lee Anonymous E-Voting Scheme , 2012 .

[25]  Zuzana Rjašková Electronic Voting Schemes , 2002 .

[26]  Josh Benaloh Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.

[27]  Michael R. Clarkson,et al.  Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[28]  A. S. Sodiya,et al.  A Receipt-free Multi-Authority E-Voting System , 2011 .

[29]  Joe McCarthy,et al.  Transparency and e-Voting: Democratic vs. Commercial Interests , 2004, Electronic Voting in Europe.

[30]  Jeremy Clark,et al.  Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.

[31]  Guoliang Xue,et al.  Efficient anonymous message submission , 2012, INFOCOM.

[32]  Priyanka Gupta,et al.  Prime III: a user centered voting system , 2007, CHI Extended Abstracts.

[33]  A. Nakajima,et al.  Decentralized voting protocols , 1993, Proceedings ISAD 93: International Symposium on Autonomous Decentralized Systems.

[34]  Ralf Küsters,et al.  Clash Attacks on the Verifiability of E-Voting Systems , 2012, 2012 IEEE Symposium on Security and Privacy.

[35]  Matthew K. Franklin,et al.  Multi-Autority Secret-Ballot Elections with Linear Work , 1996, EUROCRYPT.

[36]  Melanie Volkamer,et al.  Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[37]  Véronique Cortier,et al.  SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions , 2015, 2015 IEEE Symposium on Security and Privacy.

[38]  Jeremy Epstein,et al.  Electronic Voting , 2007, Computer.

[39]  Jacques Traoré,et al.  Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant , 2016, Financial Cryptography Workshops.

[40]  Ali Miri,et al.  Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[41]  Chun-Ta Li,et al.  A Verifiable Electronic Voting Scheme over the Internet , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[42]  Sorin Iftene,et al.  General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting , 2007, ICS@SYNASC.

[43]  Byoungcheon Lee,et al.  Receipt-free Electronic Voting through Collaboration of Voter and Honest Verifier , 2000 .

[44]  Rolf Haenni,et al.  A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time , 2011, Financial Cryptography.

[45]  Cacm Staff Seven principles for secure e-voting , 2009 .

[46]  Byoungcheon Lee,et al.  Providing Receipt-Freeness in Mixnet-Based Voting Protocols , 2003, ICISC.

[47]  Feng Hao,et al.  A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.

[48]  Martin Hirt,et al.  Receipt-Free K-out-of-L Voting Based on ElGamal Encryption , 2010, Towards Trustworthy Elections.

[49]  Peter Y. A. Ryan,et al.  Caveat Coercitor: Coercion-Evidence in Electronic Voting , 2013, 2013 IEEE Symposium on Security and Privacy.

[50]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[51]  Véronique Cortier,et al.  SoK: Verifiability Notions for E-Voting Protocols , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[52]  Aggelos Kiayias,et al.  DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles , 2015, CCS.

[53]  Georg Fuchsbauer,et al.  BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme , 2015, IACR Cryptol. ePrint Arch..

[54]  Dan S. Wallach,et al.  VoteBox: A Tamper-evident, Verifiable Electronic Voting System , 2008, USENIX Security Symposium.

[55]  Dan S. Wallach,et al.  Casting Votes in the Auditorium , 2007, EVT.

[56]  Josh Benaloh,et al.  Simple Verifiable Elections , 2006, EVT.

[57]  Panayiotis Tsanakas,et al.  From Helios to Zeus , 2013, EVT/WOTE.

[58]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[59]  Saikat Basu,et al.  UNCOERCIBILITY IN E -VOTING AND E - AUCTIONING MECHANISMS USING DENIABLE ENCRYPTION , 2011 .

[60]  Moti Yung,et al.  Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.

[61]  Karen L. Shanton Election Administration and Voting Survey: Overview and 2018 Findings [July 9, 2019] , 2019 .

[62]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[63]  Cheng-Chi Lee,et al.  A New Proxy Electronic Voting Scheme Based on Proxy Signatures , 2012 .

[64]  Ronald Cramer,et al.  A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..

[65]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[66]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[67]  Moni Naor,et al.  Split-ballot voting: Everlasting privacy with distributed trust , 2007, TSEC.

[68]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[69]  Juan E. Gilbert,et al.  Prime III: an innovative electronic voting interface , 2009, IUI.

[70]  Feng Li,et al.  Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[71]  Joseph K. Liu,et al.  Robust Receipt-Free Election System with Ballot Secrecy and Verifiability , 2008, NDSS.

[72]  Jörn Müller-Quade,et al.  Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.

[73]  Byoungcheon Lee,et al.  An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness , 2004, TrustBus.

[74]  Diego A. López García,et al.  A flexible e-voting scheme for debate tools , 2016, Comput. Secur..

[75]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[76]  Jacques Stern,et al.  Practical multi-candidate election system , 2001, PODC '01.

[77]  Melanie Volkamer,et al.  Electronic voting with fully distributed trust and maximized flexibility regarding ballot design , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).

[78]  Jean-Jacques Quisquater,et al.  Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.

[79]  Tatsuaki Okamoto,et al.  Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.

[80]  Jeremy Clark,et al.  Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance , 2011, Financial Cryptography.

[81]  Melanie Volkamer,et al.  Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.

[82]  Kefei Chen,et al.  Receipt-Freeness for Groth e-Voting Schemes , 2009, J. Inf. Sci. Eng..

[83]  David Chaum,et al.  Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA , 1988, EUROCRYPT.

[84]  Kazue Sako,et al.  Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.

[85]  Atsushi Fujioka,et al.  An Improvement on a Practical Secret Voting Scheme , 1999, ISW.

[86]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.