Paper 2011/317
Two Simple Code-Verification Voting Protocols
Helger Lipmaa
Abstract
Norwegian nationwide Internet voting will make use of a setting that we will call the code-verification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by Gjøsteen. As we show, Gjøsteen's protocol has several undesirable properties. In particular, one of the online servers shares the secret key with the offline tallier. Even without considering that, the coalition of two online voting servers can breach voter privacy. We propose two new code-verification voting protocols. The first protocol separates the secret keys, and is as efficient as Gjøsteen's protocol. The second protocol provides voter privacy against the coalition of online voting servers but is somewhat less efficient. While the new protocols are more secure than the protocol that is going to be used in the Norwegian nationwide Internet voting, they are based on the same setting, so as to minimize the required infrastructural changes.
Note: The result dates back to Spring 2010, but has not been formally published
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Code-verification votingInternet votingmalicious voter PC
- Contact author(s)
- helger lipmaa @ gmail com
- History
- 2011-06-17: received
- Short URL
- https://ia.cr/2011/317
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/317, author = {Helger Lipmaa}, title = {Two Simple Code-Verification Voting Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/317}, year = {2011}, url = {https://eprint.iacr.org/2011/317} }