Cryptology ePrint Archive: Report 2018/222

Authentication with weaker trust assumptions for voting systems

Elizabeth A. Quaglia and Ben Smyth

Abstract: Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic construction for voting systems with their own authentication mechanisms, from systems that rely on external authentication services. We prove that our construction produces systems satisfying ballot secrecy and election verifiability, assuming the underlying voting system does. Moreover, we observe that works based on similar ideas provide neither ballot secrecy nor election verifiability. Finally, we demonstrate applicability of our results by applying our construction to the Helios voting system.

Category / Keywords: cryptographic protocols /

Original Publication (with minor differences): Africacrypt 2018

Date: received 23 Feb 2018, last revised 21 Mar 2018

Contact author: elizabeth quaglia at rhul ac uk

Available format(s): PDF | BibTeX Citation

Version: 20180321:084440 (All versions of this report)

Short URL: ia.cr/2018/222


[ Cryptology ePrint archive ]