Selene: V
- ting with
T ransparent V erifiability and Coercion Mitigation
Voting’16 26 Feb 2016 1
Peter Y A Ryan Vincenzo Iovino and Peter Roenne
Coercion Mitigation Peter Y A Ryan Vincenzo Iovino and Peter - - PowerPoint PPT Presentation
Selene: V oting with T ransparent V erifiability and Coercion Mitigation Peter Y A Ryan Vincenzo Iovino and Peter Roenne Universit du Luxembourg Voting16 26 Feb 2016 1 Outline End - To - End verifiability Outline of
Voting’16 26 Feb 2016 1
Peter Y A Ryan Vincenzo Iovino and Peter Roenne
counted, without introducing coercion threats.
encoded version of their vote.
V
the posted receipts.
– Integrity/accuracy: the count accurately reflects (legitimate) votes cast. – Individual verifiability: every voter can confirm that her vote is accurately recorded. – Universal verifiability: anyone can verify that the recorded ballots are accurately tabulated. – (Universal) Eligibility verifiability: anyone can verify than only valid votes are cast, and no voter casts more than one vote (needs PKI or similar).
– Ballot secrecy: the way a voter casts her vote should be known only to the voter. – Receipt-freeness: there must be no way for a voter to construct a proof of how she voted (post hoc). – Coercion resistance: a voter can always cast a vote according to her intent while appearing to comply with a coercer’s instructions, (before, during and after the voting ceremony).
– Availability – Accountability – Accessibility – Resilience/recoverability – etc. etc....
encrypted ballots and the expectation to be able to find a vote in the clear on the WBB.
non-intuitive.
ThreeBallot....
tracker number and post these along with the votes in the clear.
erification is simple and intuitive-no need to handle encrypted ballots etc.
e have to guarantee that voters get unique trackers.
kept secret.
community, aside maybe for “boardroom” style contexts.
number so that he can check how she voted.
voter to reveal her tracker before the ballots are
suitable off the WBB.
posting!?
tracker number.
trackers/voters have been posted) in a way that provides high assurance but is deniable.
single entity knows the assignment.
rap Door Commitment for voter i.
tracker.
compute g^nj and post to the WBB.
PK of the g^nj : {g^nj}PK.
encryption mixes and assign the resulting shuffled, re-encrypted numbers to the voters’ Ids (PKi).
form:
mixes, no single entity knows the assignment. But the verifiable shuffling preserves the uniqueness.
trap-door commitments to the tracker numbers.
rustees.
rustee Tj generates a fresh random r_i,j, computes gr_i,j and hir_i,j , where hi = PKi.
formedness of ({gr}PK, {hir}PK)
the t Tellers of these:
{gn_i}PK previously posted:
rustees now perform a (verified) threshold decryption to yield the (Pedersen) trapdoor commitments:
such as Cramer-Shoup, and sends this to the server:
e extract the last two terms of the tuple, and strip off the signature and ZK proofs:
encryption mixes and threshold decrypted:
available on the WBB for a while, we notify the voters of their tracker.
e treat the gn_i⋅h_ir_i as the “beta” components
rustee T_j reveals to V_i gr_i,j through a private (anonymous) channel.
give gr_i and can then form the ElGamal cryptogram:
key xi to reveal: gn_i, and hence n_i.
gr_i to the voter, but requires more trust.
knowledge of the trapdoor, an alternative (gr_i)ʹ value which will open the encryption to whichever tracker number she needs to satisfy the coercer.
secret trapdoor, this is intractable, so revealing the wrong tracker to the voter should not be feasible for an attacker.
from the mix construction.
intractable for anyone but the voter to compute alternative (gr_i)ʹ that will open the commitment to an alternative valid tracker.
the clear in the WBB seems to change the trust model, in particular for the voter device!?
“Benaloh” challenges?!
against a coercer who demands the voter reveal her SK.
before posting, see Belenios RF, using malleable signatures.
very direct, intuitive way for voters to check that their vote is accurately included in the tally.
coerced voter V might by chance chose C’s tracker.
number, even if in reality it isn’t!
mild.
verification probably outweighs this threat.
trackers for each candidate. If coerced the voter can request a suitable dummy tracker instead of her real one.
possible add-ons to existing schemes.
encrypted ballots, e.g. Helios.
reporting prior to and during voting.
transparency for the verification while providing a good level of coercion resistance.
Selene II could be used, but at a cost in terms of transparency of verifiability.
transparency and usability?
rust model for devices etc.