A Protocol for Cast-as-Intended Verifiability with a Second Device

04/19/2023
by   Johannes Müller, et al.
0

Numerous institutions, such as companies, universities, or non-governmental organizations, employ Internet voting for remote elections. Since the main purpose of an election is to determine the voters' will, it is fundamentally important to ensure that the final election result correctly reflects the voters' votes. To this end, modern secure Internet voting schemes aim for what is called end-to-end verifiability. This fundamental security property ensures that the correctness of the final result can be verified, even if some of the computers or parties involved are malfunctioning or corrupted. A standard component in this approach is so called cast-as-intended verifiability which enables individual voters to verify that the ballots cast on their behalf contain their intended choices. Numerous approaches for cast-as-intended verifiability have been proposed in the literature, some of which have also been employed in real-life Internet elections. One of the well established approaches for cast-as-intended verifiability is to employ a second device which can be used by voters to audit their submitted ballots. This approach offers several advantages - including support for flexible ballot/election types and intuitive user experience - and it has been used in real-life elections, for instance in Estonia. In this work, we improve the existing solutions for cast-as-intended verifiability based on the use of a second device. We propose a solution which, while preserving the advantageous practical properties sketched above, provides tighter security guarantees. Our method does not increase the risk of vote-selling when compared to the underlying voting protocol being augmented and, to achieve this, it requires only comparatively weak trust assumptions. It can be combined with various voting protocols, including commitment-based systems offering everlasting privacy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/26/2019

A universally verifiable voting protocol with complete cast-as-intended and counted-as-cast guarantees

We present a universally verifiable voting protocol and establish its co...
research
11/08/2021

Towards Verifiable Remote Voting with Paper Assurance

We propose a protocol for verifiable remote voting with paper assurance....
research
10/26/2022

Ballot stuffing and participation privacy in pollsite voting

We study the problem of simultaneously addressing both ballot stuffing a...
research
05/21/2022

Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules

Electronic voting systems are essential for holding virtual elections, a...
research
09/19/2023

Trust assumptions in voting systems

Assessing and comparing the security level of different voting systems i...
research
08/14/2019

Risk-Limiting Tallies

Many voter-verifiable, coercion-resistant schemes have been proposed, bu...
research
03/12/2021

Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting

We present Phrase-Verified Voting, a voter-verifiable remote voting syst...

Please sign up or login with your details

Forgot password? Click here to reset