International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On E-Vote Integrity in the Case of Malicious Voter Computers

Authors:
Sven Heiberg
Helger Lipmaa
Filip Van Laenen
Download:
URL: http://eprint.iacr.org/2010/195
Search ePrint
Search Google
Abstract: Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was identified as a serious threat to e-voting. Therefore, in this paper, we study the vote integrity of e-voting when the voter computers cannot be trusted. For this, we first make a number of assumptions---that arose from the discussion with the representatives of Norwegian government, and have been approved by them---about the available infrastructure. In particular, we assume the existence of two out-of-band channels that do not depend on the voter computers. The first channel is used to transmit integrity check codes to the voters prior the election, and the second channel is used to transmit a check code, that corresponds to her vote, back to a voter just after his or her e-vote vast cast. For this we also introduce a new cryptographic protocol. We present the new protocol with enough details to facilitate an implementation, and also present the timings of an actual implementation.
BibTeX
@misc{eprint-2010-23096,
  title={On E-Vote Integrity in the Case of Malicious Voter Computers},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / Implementation, integrity, malicious voter computers, nationwide e-voting, proxy oblivious transfer, zero-knowledge proofs},
  url={http://eprint.iacr.org/2010/195},
  note={ lipmaa@research.cyber.ee 14707 received 8 Apr 2010},
  author={Sven Heiberg and Helger Lipmaa and Filip Van Laenen},
  year=2010
}