Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme

01/08/2019
by   Peter B. Rønne, et al.
0

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The exhaustive, comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/18/2018

A voting scheme with post-quantum security based on physical laws

Traditional cryptography is under huge threat along of the evolution of ...
research
12/10/2019

Post-Quantum Zero Knowledge in Constant Rounds

We construct the first constant-round zero-knowledge classical argument ...
research
12/08/2020

Quantum Fully Homomorphic Encryption without Clifford Decomposition and Real Representation

We present a novel quantum fully homomorphic encryption (QFHE) scheme, w...
research
03/21/2022

Proposal for Quantum Ciphertext-Policy Attribute-Based Encryption

A Quantum Ciphertext-Policy Attribute-Based Encryption scheme (QCP-ABE) ...
research
06/07/2022

Anonymous voting scheme using quantum assisted blockchain

Voting forms the most important tool for arriving at a decision in any i...
research
05/11/2022

Delay Encryption by Cubing

Delay Encryption (often called Timed-Release Encryption) is a scheme in ...

Please sign up or login with your details

Forgot password? Click here to reset