Loading...
Minimal assumptions to achieve privacy in e-voting protocols
Haghighat, A. T ; Sharif University of Technology | 2013
497
Viewed
- Type of Document: Article
- DOI: 10.1109/ISCISC.2013.6767345
- Publisher: IEEE Computer Society , 2013
- Abstract:
- Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary, existence of an untappable/anonymous channel between voters and the authorities, or physical assumptions
- Keywords:
- E-voting protocols ; Security of data ; Computational power ; Physical assumptions ; Privacy preserving ; Universal verifiability ; Verifiability ; Cryptography
- Source: 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013
- URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6767345