Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption
Author(s)
Forsythe, Joy Marie
Downloadvtp_wp41.pdf (575.9Kb)
Metadata
Show full item recordAbstract
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption. This thesis proposes adding voter verification to an existing multi-candidate election scheme (Baudron et al.) that uses Paillier encryption. A “cut and choose” protocol provides a probabilistic guarantee of correctness. The scheme is straightforward, and could easily be extended to multi-authority elections. The feasibility of the proposed scheme is demonstrated via a simple implementation.
Date issued
2005-09Publisher
Caltech/MIT Voting Technology Project
Series/Report no.
VTP Working Paper Series;41
Keywords
Encryption, Voter verification, Homomorphic encryption, Pailler encryption
Collections
Related items
Showing items related by title, author, creator and subject.
-
18.304 Undergraduate Seminar in Discrete Mathematics, Spring 2006
Kleitman, Daniel (2006-06)This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and ... -
Bounded CCA2-Secure Non-Malleable Encryption
Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod (2006-12-14)Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security ...