Paper 2015/558
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, and Philemon von Bergen
Abstract
Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Major revision. 10th International Conference on Availability, Reliability and Security (ARES 2015)
- Keywords
- electronic voting
- Contact author(s)
- oksana kulyk @ secuso org
- History
- 2015-06-17: received
- Short URL
- https://ia.cr/2015/558
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/558, author = {Oksana Kulyk and Stephan Neumann and Jurlind Budurushi and Melanie Volkamer and Rolf Haenni and Reto Koenig and Philemon von Bergen}, title = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/558}, year = {2015}, url = {https://eprint.iacr.org/2015/558} }