Practical remote end-to-end voting scheme

Full text for this resource is not available from the Research Repository.

Yi, Xun and Okamoto, Eiji (2011) Practical remote end-to-end voting scheme. In: Electronic Government and the Information Systems Perspective : Second International Conference, EGOVIS 2011 : Toulouse, France, August 29 - September 2, 2011 : proceedings. Andersen, Kim Normann, Francesconi, Enrico, Gronlund, Ake and van Engers, Tom M, eds. Lecture notes in computer science (6866). Springer, Heidelberg, Germany, pp. 386-400.

Abstract

Recently, remote voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States and France. Current remote voting schemes assume either the voter’s personal computer is trusted or the voter is not physically coerced. In this paper, we present a remote end-to-end voting scheme, in which the voter’s choice remains secret even if the voter’s personal computer is infected by malware or the voter is physically controlled by the adversary. In particular, our scheme can achieve absolute verifiability even if all election authorities are corrupt. Based on homomorphic encryption, the overhead for tallying in our scheme is linear in the number of candidates. Thus, our scheme is practical for elections at a large scale, such as general elections.

Item type Book Section
URI http://vuir.vu.edu.au/id/eprint/9596
Identification Number https://doi.org/10.1007/978-3-642-22961-9_30
Official URL http://link.springer.com/content/pdf/10.1007%2F978...
ISBN 9783642229602 (print), 9783642229619 (online)
Subjects Current > FOR Classification > 0804 Data Format
Current > FOR Classification > 0806 Information Systems
Historical > SEO Classification > 8903 Information Services
Historical > Faculty/School/Research Centre/Department > School of Engineering and Science
Keywords ResPubID23613, electronic voting, coercion-resistance, elections, decryption networks, encrypted ballots, remote voting schemes, security proof
Citations in Scopus 13 - View on Scopus
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login