Paper 2015/1119

On the Possibility of Non-Interactive E-Voting in the Public-key Setting

Rosario Giustolisi, Vincenzo Iovino, and Peter B. Rønne

Abstract

In 2010 Hao, Ryan and Zielinski proposed a simple decentralized e- voting protocol that only requires 2 rounds of communication. Thus, for k elections their protocol needs 2k rounds of communication. Observing that the first round of their protocol is aimed to establish the public-keys of the voters, we propose an extension of the protocol as a non-interactive e-voting scheme in the public-key setting (NIVS) in which the voters, after having published their public-keys, can use the corresponding secret-keys to participate in an arbitrary number of one-round elections. We first construct a NIVS with a standard tally function where the number of votes for each candidate is counted. Further, we present constructions for two alternative types of elections. Specifically in the first type (dead or alive elections) the tally shows if at least one voter cast a vote for the candidate. In the second one (elections by unanimity), the tally shows if all voters cast a vote for the candidate. Our constructions are based on bilinear maps of prime order. As definitional contribution we provide formal computational definitions for privacy and verifiability of NIVSs. We conclude by showing intriguing relations between our results, secure computation, electronic exams and conference management systems.

Note: added publication information and revised it with minor changes

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. VOTING '16
Keywords
electronic electionscryptographic protocols
Contact author(s)
vinciovino @ gmail com
History
2015-12-16: last of 4 revisions
2015-11-19: received
See all versions
Short URL
https://ia.cr/2015/1119
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/1119,
      author = {Rosario Giustolisi and Vincenzo Iovino and Peter B.  Rønne},
      title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting},
      howpublished = {Cryptology ePrint Archive, Paper 2015/1119},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/1119}},
      url = {https://eprint.iacr.org/2015/1119}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.