A Comprehensive Analysis of Quantum E-voting Protocols

10/11/2018
by   Myrto Arapinis, et al.
0

Recent advances at Google, IBM, as well as a number of research groups indicate that quantum computers will soon be reality. Motivated by the ever more realistic threat quantum computers pose to existing classical cryptographic protocols, researchers have developed several schemes to resist "quantum attacks". In particular, for electronic voting, several e-voting schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims which are never formalized and are at best justified only against specific attacks. In this paper, we systematize and evaluate the security of suggested e-voting protocols based on quantum technology. We examine the claims of these works concerning privacy, correctness and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identified specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and in a more general lack of reference to the existing cryptographic literature.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/18/2018

A voting scheme with post-quantum security based on physical laws

Traditional cryptography is under huge threat along of the evolution of ...
research
05/04/2021

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Quantum computing technologies pose a significant threat to the currentl...
research
05/05/2021

Vulnerability of Blockchain Technologies to Quantum Attacks

Quantum computation represents a threat to many cryptographic protocols ...
research
09/18/2021

A Distributed Process Model of Cryptographic Protocols

Cryptographic Protocols (CP) are distributed algorithms intended for sec...
research
05/04/2021

Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations

What do Apple, the FBI and a Belgian politician have in common? In 2003,...
research
09/05/2023

Quantum Voting and Violation of Gibbard-Satterthwaite's Impossibility Theorem

In the realm of algorithmic economics, voting systems are evaluated and ...
research
05/07/2020

Dispute Resolution in Voting

In voting, disputes arise when a voter claims that the voting authority ...

Please sign up or login with your details

Forgot password? Click here to reset