Election verifiability or ballot privacy: Do we need to choose?

33Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this primitive that enable building the first universally verifiable voting schemes with a perfectly private audit trail (PPAT) and practical complexity. That is: - the audit trail that is published for verifying elections guarantees everlasting privacy, and - the computational load required from the participants is only increased by a small constant factor compared to traditional voting schemes, and is optimal in the sense of Cramer, Gennaro and Schoenmakers [16]. These properties make it possible to introduce election verifiability in large scale elections as a pure benefit, that is, without loss of privacy compared to a non-verifiable scheme and at a similar level of efficiency. We propose different approaches for constructing voting schemes with PPAT from CCE, as well as two efficient CCE constructions: one is tailored for elections with a small number of candidates, while the second is suitable for elections with complex ballots. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Cuvelier, É., Pereira, O., & Peters, T. (2013). Election verifiability or ballot privacy: Do we need to choose? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8134 LNCS, pp. 481–498). https://doi.org/10.1007/978-3-642-40203-6_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free