Paper 2015/1119
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
Rosario Giustolisi, Vincenzo Iovino, and Peter B. Rønne
Abstract
In 2010 Hao, Ryan and Zielinski proposed a simple decentralized e- voting protocol that only requires 2 rounds of communication. Thus, for k elections their protocol needs 2k rounds of communication. Observing that the first round of their protocol is aimed to establish the public-keys of the voters, we propose an extension of the protocol as a non-interactive e-voting scheme in the public-key setting (NIVS) in which the voters, after having published their public-keys, can use the corresponding secret-keys to participate in an arbitrary number of one-round elections. We first construct a NIVS with a standard tally function where the number of votes for each candidate is counted. Further, we present constructions for two alternative types of elections. Specifically in the first type (dead or alive elections) the tally shows if at least one voter cast a vote for the candidate. In the second one (elections by unanimity), the tally shows if all voters cast a vote for the candidate. Our constructions are based on bilinear maps of prime order. As definitional contribution we provide formal computational definitions for privacy and verifiability of NIVSs. We conclude by showing intriguing relations between our results, secure computation, electronic exams and conference management systems.
Note: added publication information and revised it with minor changes
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Minor revision. VOTING '16
- Keywords
- electronic electionscryptographic protocols
- Contact author(s)
- vinciovino @ gmail com
- History
- 2015-12-16: last of 4 revisions
- 2015-11-19: received
- See all versions
- Short URL
- https://ia.cr/2015/1119
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/1119, author = {Rosario Giustolisi and Vincenzo Iovino and Peter B. Rønne}, title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/1119}, year = {2015}, url = {https://eprint.iacr.org/2015/1119} }