MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • Department of Political Science
  • Voting Technology Project
  • Publications and Working Papers
  • View Item
  • DSpace@MIT Home
  • Department of Political Science
  • Voting Technology Project
  • Publications and Working Papers
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption

Author(s)
Forsythe, Joy Marie
Thumbnail
Downloadvtp_wp41.pdf (575.9Kb)
Metadata
Show full item record
Abstract
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption. This thesis proposes adding voter verification to an existing multi-candidate election scheme (Baudron et al.) that uses Paillier encryption. A “cut and choose” protocol provides a probabilistic guarantee of correctness. The scheme is straightforward, and could easily be extended to multi-authority elections. The feasibility of the proposed scheme is demonstrated via a simple implementation.
Date issued
2005-09
URI
http://hdl.handle.net/1721.1/96578
Publisher
Caltech/MIT Voting Technology Project
Series/Report no.
VTP Working Paper Series;41
Keywords
Encryption, Voter verification, Homomorphic encryption, Pailler encryption

Collections
  • Publications and Working Papers

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    18.304 Undergraduate Seminar in Discrete Mathematics, Spring 2006 

    Kleitman, Daniel (2006-06)
    This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and ...
  • Thumbnail

    Bounded CCA2-Secure Non-Malleable Encryption 

    Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod (2006-12-14)
    Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security ...

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.