-
Previous Article
Nearly optimal codebooks from generalized Boolean bent functions over $ \mathbb{Z}_{4} $
- AMC Home
- This Issue
-
Next Article
Rotated $ A_n $-lattice codes of full diversity
A coercion-resistant blockchain-based E-voting protocol with receipts
Department of Mathematics, University Of Trento, 38123 Povo, Trento, Italy |
We propose a decentralized e-voting protocol that is coercion-resistant and vote-selling resistant, while being also completely transparent and not receipt-free. We achieve decentralization using blockchain technology. Because of the properties such as transparency, decentralization, and non-repudiation, blockchain is a fundamental technology of great interest in its own right, and it also has large potential when integrated into many other areas. We prove the security of the protocol under the standard DDH assumption on the underlying prime-order cyclic group (e.g. the group of points of an elliptic curve), as well as under standard assumptions on blockchain robustness.
References:
[1] |
B. Adida, Helios: Web-based open-audit voting, USENIX Security Symposium, 17 (2008), 335-348. Google Scholar |
[2] |
R. Alyoshkin, Polys Whitepaper, Available from: https://docs.polys.me/en/collections/699457-technology-whitepaper. Google Scholar |
[3] |
E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich et al., Hyperledger fabric: A distributed operating system for permissioned blockchains, in Proceedings of the Thirteenth EuroSys Conference, ACM, (2018), 1–15.
doi: 10.1145/3190508.3190538. |
[4] |
L. Babai and S. Moran,
Arthur-merlin games: A randomized proof system, and a hierarchy of complexity class, Journal of Computer and System Sciences, 36 (1988), 254-276.
doi: 10.1016/0022-0000(88)90028-1. |
[5] |
M. Blum, P. Feldman and S. Micali, Non-interactive zero-knowledge and its applications, in Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC, ACM, (1988), 103–112.
doi: 10.1145/62212.62222. |
[6] |
J.-M. Bohli, J. Müller-Quade and S. Röhrich, Bingo voting: Secure and coercion-free voting using a trusted random number generator, in Proceedings of International Conference on E-Voting and Identity, Springer, 2007,111–124.
doi: 10.1007/978-3-540-77493-8_10. |
[7] |
G. Brassard, D. Chaum and C. Crépeau,
Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, 37 (1988), 156-189.
doi: 10.1016/0022-0000(88)90005-0. |
[8] |
A. Cardillo, N. Akinyokun and A. Essex, Online voting in ontario municipal elections: A conflict of legal principles and technology?, in Electronic Voting (eds. R. Krimmer, M. Volkamer, V. Cortier, B. Beckert, R. Küsters, U. Serdült and D. Duenas-Cid), Springer International Publishing, Cham, (2019), 67–82.
doi: 10.1007/978-3-030-30625-0_5. |
[9] |
M. R. Clarkson, S. Chong and A. C. Myers, Civitas: Toward a secure voting system, in Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP, IEEE Computer Society, (2008), 354–368
doi: 10.1109/SP.2008.32. |
[10] |
D. Costa, F. Fiori, P. Milan, M. Sala, A. Vitale and M. Vitale, Quadrans Whitepaper, 2019. Available from: https://quadrans.io/content/files/quadrans-white-paper-rev01.pdf. Google Scholar |
[11] |
L. Fouard, M. Duclos and P. Lafourcade, Survey on Electronic Voting Schemes, 2007. Google Scholar |
[12] |
F. Fusco, M. I. Lunesu, F. Pani and A. Pinna, Crypto-voting, a blockchain based e-voting system, in 10th International Conference on Knowledge Management and Information Sharing, (2018), 223–227.
doi: 10.5220/0006962102230227. |
[13] |
N. Gailly, P. Jovanovic, B. Ford, J. Lukasiewicz and L. Gammar, Agora: Bringing our Voting Systems into the 21st Century, 2018. Google Scholar |
[14] |
D. Goswami, United States Postal Service Secure Voting System, US Patent Application Publication, 2020 Google Scholar |
[15] |
G. Grewal, M. Ryan, S. Bursuc and P. Ryan, Caveat Coercitor: Coercion-Evidence in Electronic Voting, in Proceedings - IEEE Symposium on Security and Privacy, IEEE, (2013), 367–381.
doi: 10.1109/SP.2013.32. |
[16] |
S. B. Khairnar, P. S. Naidu and R. Kharat, Secure authentication for online voting system, in 2016 International Conference on Computing Communication Control and automation (ICCUBEA), (2016), 1–4. Google Scholar |
[17] |
K. Koštál, R. Bencel, M. Ries and I. Kotuliak, Blockchain e-voting done right: Privacy and transparency with public blockchain, in 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), IEEE, (2019), 592–595. Google Scholar |
[18] |
H. Li, A. Kankanala and X. Zou, A taxonomy and comparison of remote voting schemes, in Proceedings - International Conference on Computer Communications and Networks, ICCCN, IEEE, (2014), 1–8.
doi: 10.1109/ICCCN.2014.6911807. |
[19] |
Y. Lindell, Tutorials on the Foundations of Cryptography, Chapter How to Simulate It – A Tutorial on the Simulation Proof Technique, Springer, 2017. |
[20] |
R. Longo, Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols, PhD thesis, University Of Trento, Department of Mathematics, 2018. Google Scholar |
[21] |
P. McCorry, S. Shahandashti and F. Hao, A smart contract for boardroom voting with maximum voter privacy, in 21st International Conference on Financial Cryptography and Data Security (FC17), Sliema, Malta, (2017), 357–375. |
[22] |
A. Meneghetti, M. Sala and D. Taufer, A Survey on PoW-based Consensus, Annals of Emerging Technologies in Computing (AETiC), 4, 11 pp.
doi: 10.33166/AETiC.2020.01.002. |
[23] |
A. Rea, A. F. D. Kronovet and J. du Rose, Colony Technical Whitepaper, 2020. Available from: https://colony.io/whitepaper.pdf. Google Scholar |
[24] |
C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, 4 (1991), 161-174. Google Scholar |
[25] |
V. Shoup and J. Alwen, $\Sigma$-Protocols Continued and Introduction to Zero Knowledge, 2007. Available from: https://web.archive.org/web/20170830043326/https://cs.nyu.edu/courses/spring07/G22.3220-001/lec3.pdf. Google Scholar |
[26] |
C. Spadafora, A New Blockchain-Based Secure E-Voting Protocol, Master's thesis, University of Trento, Department of Mathematics, Academic Year 2018/2019. Google Scholar |
[27] |
C. Spadafora, R. Longo and M. Sala, Coercion-Resistant Blockchain-Based E-Voting Protocol, Cryptology ePrint Archive, Report 2020/674 version 20200605: 195929, 2020. Available from: https://eprint.iacr.org/eprint-bin/getfile.pl?entry=2020/674&version=20200605:195929&file=674.pdf. Google Scholar |
[28] |
M. A. Specter, J. Koppel and D. Weitnzer, The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in us federal elections, Preprint, Available at: https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf. Google Scholar |
[29] |
F. D. Team, Introducing a Secure and Transparent Online Voting Solution for Modern Age: Follow My Vote, Available from: https://followmyvote.com/. Google Scholar |
[30] |
V. D. Team, Vocdoni Documentation, Available from: https://docs.vocdoni.io/. Google Scholar |
[31] |
K.-H. Wang, S. K. Mondal, K. Chan and X. Xie, A review of contemporary e-voting: Requirements, technology, systems and usability, Data Science and Pattern Recognition, 1 (2017), 31-47. Google Scholar |
[32] |
S. Xiao, X. A. Wang, W. Wang and H. Wang, Survey on blockchain-based electronic voting, in Advances in Intelligent Networking and Collaborative Systems (eds. L. Barolli, H. Nishino and H. Miwa), Springer, (2020), 559–567.
doi: 10.1007/978-3-030-29035-1_54. |
show all references
References:
[1] |
B. Adida, Helios: Web-based open-audit voting, USENIX Security Symposium, 17 (2008), 335-348. Google Scholar |
[2] |
R. Alyoshkin, Polys Whitepaper, Available from: https://docs.polys.me/en/collections/699457-technology-whitepaper. Google Scholar |
[3] |
E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich et al., Hyperledger fabric: A distributed operating system for permissioned blockchains, in Proceedings of the Thirteenth EuroSys Conference, ACM, (2018), 1–15.
doi: 10.1145/3190508.3190538. |
[4] |
L. Babai and S. Moran,
Arthur-merlin games: A randomized proof system, and a hierarchy of complexity class, Journal of Computer and System Sciences, 36 (1988), 254-276.
doi: 10.1016/0022-0000(88)90028-1. |
[5] |
M. Blum, P. Feldman and S. Micali, Non-interactive zero-knowledge and its applications, in Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC, ACM, (1988), 103–112.
doi: 10.1145/62212.62222. |
[6] |
J.-M. Bohli, J. Müller-Quade and S. Röhrich, Bingo voting: Secure and coercion-free voting using a trusted random number generator, in Proceedings of International Conference on E-Voting and Identity, Springer, 2007,111–124.
doi: 10.1007/978-3-540-77493-8_10. |
[7] |
G. Brassard, D. Chaum and C. Crépeau,
Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, 37 (1988), 156-189.
doi: 10.1016/0022-0000(88)90005-0. |
[8] |
A. Cardillo, N. Akinyokun and A. Essex, Online voting in ontario municipal elections: A conflict of legal principles and technology?, in Electronic Voting (eds. R. Krimmer, M. Volkamer, V. Cortier, B. Beckert, R. Küsters, U. Serdült and D. Duenas-Cid), Springer International Publishing, Cham, (2019), 67–82.
doi: 10.1007/978-3-030-30625-0_5. |
[9] |
M. R. Clarkson, S. Chong and A. C. Myers, Civitas: Toward a secure voting system, in Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP, IEEE Computer Society, (2008), 354–368
doi: 10.1109/SP.2008.32. |
[10] |
D. Costa, F. Fiori, P. Milan, M. Sala, A. Vitale and M. Vitale, Quadrans Whitepaper, 2019. Available from: https://quadrans.io/content/files/quadrans-white-paper-rev01.pdf. Google Scholar |
[11] |
L. Fouard, M. Duclos and P. Lafourcade, Survey on Electronic Voting Schemes, 2007. Google Scholar |
[12] |
F. Fusco, M. I. Lunesu, F. Pani and A. Pinna, Crypto-voting, a blockchain based e-voting system, in 10th International Conference on Knowledge Management and Information Sharing, (2018), 223–227.
doi: 10.5220/0006962102230227. |
[13] |
N. Gailly, P. Jovanovic, B. Ford, J. Lukasiewicz and L. Gammar, Agora: Bringing our Voting Systems into the 21st Century, 2018. Google Scholar |
[14] |
D. Goswami, United States Postal Service Secure Voting System, US Patent Application Publication, 2020 Google Scholar |
[15] |
G. Grewal, M. Ryan, S. Bursuc and P. Ryan, Caveat Coercitor: Coercion-Evidence in Electronic Voting, in Proceedings - IEEE Symposium on Security and Privacy, IEEE, (2013), 367–381.
doi: 10.1109/SP.2013.32. |
[16] |
S. B. Khairnar, P. S. Naidu and R. Kharat, Secure authentication for online voting system, in 2016 International Conference on Computing Communication Control and automation (ICCUBEA), (2016), 1–4. Google Scholar |
[17] |
K. Koštál, R. Bencel, M. Ries and I. Kotuliak, Blockchain e-voting done right: Privacy and transparency with public blockchain, in 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), IEEE, (2019), 592–595. Google Scholar |
[18] |
H. Li, A. Kankanala and X. Zou, A taxonomy and comparison of remote voting schemes, in Proceedings - International Conference on Computer Communications and Networks, ICCCN, IEEE, (2014), 1–8.
doi: 10.1109/ICCCN.2014.6911807. |
[19] |
Y. Lindell, Tutorials on the Foundations of Cryptography, Chapter How to Simulate It – A Tutorial on the Simulation Proof Technique, Springer, 2017. |
[20] |
R. Longo, Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols, PhD thesis, University Of Trento, Department of Mathematics, 2018. Google Scholar |
[21] |
P. McCorry, S. Shahandashti and F. Hao, A smart contract for boardroom voting with maximum voter privacy, in 21st International Conference on Financial Cryptography and Data Security (FC17), Sliema, Malta, (2017), 357–375. |
[22] |
A. Meneghetti, M. Sala and D. Taufer, A Survey on PoW-based Consensus, Annals of Emerging Technologies in Computing (AETiC), 4, 11 pp.
doi: 10.33166/AETiC.2020.01.002. |
[23] |
A. Rea, A. F. D. Kronovet and J. du Rose, Colony Technical Whitepaper, 2020. Available from: https://colony.io/whitepaper.pdf. Google Scholar |
[24] |
C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, 4 (1991), 161-174. Google Scholar |
[25] |
V. Shoup and J. Alwen, $\Sigma$-Protocols Continued and Introduction to Zero Knowledge, 2007. Available from: https://web.archive.org/web/20170830043326/https://cs.nyu.edu/courses/spring07/G22.3220-001/lec3.pdf. Google Scholar |
[26] |
C. Spadafora, A New Blockchain-Based Secure E-Voting Protocol, Master's thesis, University of Trento, Department of Mathematics, Academic Year 2018/2019. Google Scholar |
[27] |
C. Spadafora, R. Longo and M. Sala, Coercion-Resistant Blockchain-Based E-Voting Protocol, Cryptology ePrint Archive, Report 2020/674 version 20200605: 195929, 2020. Available from: https://eprint.iacr.org/eprint-bin/getfile.pl?entry=2020/674&version=20200605:195929&file=674.pdf. Google Scholar |
[28] |
M. A. Specter, J. Koppel and D. Weitnzer, The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in us federal elections, Preprint, Available at: https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf. Google Scholar |
[29] |
F. D. Team, Introducing a Secure and Transparent Online Voting Solution for Modern Age: Follow My Vote, Available from: https://followmyvote.com/. Google Scholar |
[30] |
V. D. Team, Vocdoni Documentation, Available from: https://docs.vocdoni.io/. Google Scholar |
[31] |
K.-H. Wang, S. K. Mondal, K. Chan and X. Xie, A review of contemporary e-voting: Requirements, technology, systems and usability, Data Science and Pattern Recognition, 1 (2017), 31-47. Google Scholar |
[32] |
S. Xiao, X. A. Wang, W. Wang and H. Wang, Survey on blockchain-based electronic voting, in Advances in Intelligent Networking and Collaborative Systems (eds. L. Barolli, H. Nishino and H. Miwa), Springer, (2020), 559–567.
doi: 10.1007/978-3-030-29035-1_54. |
[1] |
Fei Gao. Data encryption algorithm for e-commerce platform based on blockchain technology. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1457-1470. doi: 10.3934/dcdss.2019100 |
[2] |
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281 |
[3] |
Felix Fontein. Groups from cyclic infrastructures and Pohlig-Hellman in certain infrastructures. Advances in Mathematics of Communications, 2008, 2 (3) : 293-307. doi: 10.3934/amc.2008.2.293 |
[4] |
Sergei Yu. Pilyugin, M. C. Campi. Opinion formation in voting processes under bounded confidence. Networks & Heterogeneous Media, 2019, 14 (3) : 617-632. doi: 10.3934/nhm.2019024 |
[5] |
Archana Prashanth Joshi, Meng Han, Yan Wang. A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 2018, 1 (2) : 121-147. doi: 10.3934/mfc.2018007 |
[6] |
Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 |
[7] |
Andreas Klein. How to say yes, no and maybe with visual cryptography. Advances in Mathematics of Communications, 2008, 2 (3) : 249-259. doi: 10.3934/amc.2008.2.249 |
[8] |
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281 |
[9] |
Jintai Ding, Sihem Mesnager, Lih-Chung Wang. Letters for post-quantum cryptography standard evaluation. Advances in Mathematics of Communications, 2020, 14 (1) : i-i. doi: 10.3934/amc.2020012 |
[10] |
Anna-Lena Horlemann-Trautmann, Violetta Weger. Information set decoding in the Lee metric with applications to cryptography. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020089 |
[11] |
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 |
[12] |
Qing Xu, Xiaohua (Michael) Xuan. Nonlinear regression without i.i.d. assumption. Probability, Uncertainty and Quantitative Risk, 2019, 4 (0) : 8-. doi: 10.1186/s41546-019-0042-6 |
[13] |
Najeeb Abdulaleem. $ V $-$ E $-invexity in $ E $-differentiable multiobjective programming. Numerical Algebra, Control & Optimization, 2021 doi: 10.3934/naco.2021014 |
[14] |
Timothy C. Reluga, Jan Medlock. Resistance mechanisms matter in SIR models. Mathematical Biosciences & Engineering, 2007, 4 (3) : 553-563. doi: 10.3934/mbe.2007.4.553 |
[15] |
Donglin Wang, Honglan Xu, Qiang Wu. Averaging versus voting: A comparative study of strategies for distributed classification. Mathematical Foundations of Computing, 2020, 3 (3) : 185-193. doi: 10.3934/mfc.2020017 |
[16] |
Barton E. Lee. Consensus and voting on large graphs: An application of graph limit theory. Discrete & Continuous Dynamical Systems, 2018, 38 (4) : 1719-1744. doi: 10.3934/dcds.2018071 |
[17] |
Lidong Chen, Dustin Moody. New mission and opportunity for mathematics researchers: Cryptography in the quantum era. Advances in Mathematics of Communications, 2020, 14 (1) : 161-169. doi: 10.3934/amc.2020013 |
[18] |
Piotr Bajger, Mariusz Bodzioch, Urszula Foryś. Singularity of controls in a simple model of acquired chemotherapy resistance. Discrete & Continuous Dynamical Systems - B, 2019, 24 (5) : 2039-2052. doi: 10.3934/dcdsb.2019083 |
[19] |
Urszula Ledzewicz, Heinz Schättler. Drug resistance in cancer chemotherapy as an optimal control problem. Discrete & Continuous Dynamical Systems - B, 2006, 6 (1) : 129-150. doi: 10.3934/dcdsb.2006.6.129 |
[20] |
Sebastian Bonhoeffer, Pia Abel zur Wiesch, Roger D. Kouyos. Rotating antibiotics does not minimize selection for resistance. Mathematical Biosciences & Engineering, 2010, 7 (4) : 919-922. doi: 10.3934/mbe.2010.7.919 |
2019 Impact Factor: 0.734
Tools
Metrics
Other articles
by authors
[Back to Top]