Paper 2015/558

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, and Philemon von Bergen

Abstract

Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Major revision. 10th International Conference on Availability, Reliability and Security (ARES 2015)
Keywords
electronic voting
Contact author(s)
oksana kulyk @ secuso org
History
2015-06-17: received
Short URL
https://ia.cr/2015/558
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/558,
      author = {Oksana Kulyk and Stephan Neumann and Jurlind Budurushi and Melanie Volkamer and Rolf Haenni and Reto Koenig and Philemon von Bergen},
      title = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/558},
      year = {2015},
      url = {https://eprint.iacr.org/2015/558}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.