Paper 2018/222

Authentication with weaker trust assumptions for voting systems

Elizabeth A. Quaglia and Ben Smyth

Abstract

Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic construction for voting systems with their own authentication mechanisms, from systems that rely on external authentication services. We prove that our construction produces systems satisfying ballot secrecy and election verifiability, assuming the underlying voting system does. Moreover, we observe that works based on similar ideas provide neither ballot secrecy nor election verifiability. Finally, we demonstrate applicability of our results by applying our construction to the Helios voting system.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. Africacrypt 2018
Contact author(s)
elizabeth quaglia @ rhul ac uk
History
2018-03-21: revised
2018-02-27: received
See all versions
Short URL
https://ia.cr/2018/222
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/222,
      author = {Elizabeth A.  Quaglia and Ben Smyth},
      title = {Authentication with weaker trust assumptions for voting systems},
      howpublished = {Cryptology ePrint Archive, Paper 2018/222},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/222}},
      url = {https://eprint.iacr.org/2018/222}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.