Adapting Helios for Provable Ballot Privacy
David Bernhard, Veronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi September 2, 2011
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 1 / 26
Adapting Helios for Provable Ballot Privacy David Bernhard, - - PowerPoint PPT Presentation
Adapting Helios for Provable Ballot Privacy David Bernhard, Veronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi September 2, 2011 ESORICS 2011 Adapting Helios for Provable Ballot Privacy 1 / 26 Helios Helios is a web-based voting
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 1 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 2 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 3 / 26
◮ There are attacks against privacy. ◮ Helios can be adapted so that it meets a symbolic definition
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 4 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 5 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 6 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 7 / 26
◮ Ciphertexts of the vote(s). ◮ Zero-knowledge proofs of correctness.
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 8 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 9 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 10 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 10 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 10 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 10 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 11 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 12 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 13 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 14 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 14 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 14 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 15 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 16 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 16 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 17 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 18 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 18 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 18 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 18 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 19 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 20 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 21 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 22 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 23 / 26
◮ Reject ballots with repeated ciphertexts. ◮ Proof assumes IND-CCA2 security.
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 24 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 25 / 26
ESORICS 2011 Adapting Helios for Provable Ballot Privacy 26 / 26