Electt: running auditable and verifiable elections in untrusted environments

11/22/2020
by   Kirill A. Korinsky, et al.
0

We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random. Tellers see only the position of the candidate. Voters can check their vote. An election is auditable using blockchain log. Threshold-encryption, which is used to implement the quorum, prevents a deadlock from occurring if a minority of candidates or observers tries to sabotage the election. Candidates and observers can indicate that the election was free and fair by exposing their keys, which are used by the system to decrypt each vote. Ballot sheets are encrypted by onion-routing, which has a layer with the key of the election instance, so it's impossible for a quorum to decode the results before they have announced their decision by exposing their keys. A register of voters ensures that only verified voters can vote without compromising their identity. If there any doubts about the identity of a voter, their vote can be excluded from the election, if a quorum agrees. This system is designed to scale from one instance to a distributed system that runs over an unlimited number of instances, which can be achieved using cloud instances or smartphones belonging to voters or tellers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/22/2017

Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

In this paper a secure data-sharing protocol under blockchain-based dece...
research
11/11/2019

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Homomorphic encryption (HE) is a promising cryptographic technique for e...
research
03/14/2018

Secret Key Generation from Channel Noise with the Help of a Common Key

Information-theoretically secure communications are possible when channe...
research
12/15/2020

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Memory was captured from a system infected by ransomware and its content...
research
04/19/2023

Data as voters: instance selection using approval-based multi-winner voting

We present a novel approach to the instance selection problem in machine...
research
10/06/2020

BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer

A boardroom election is an election with a small number of voters carrie...
research
12/10/2019

Analyzing the Kasiski Method Against Vigenere Cipher

The weakness of the vigenere cipher lies in its short key and is repeate...

Please sign up or login with your details

Forgot password? Click here to reset