Election verifiability or ballot privacy: Do we need to choose?

35Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this primitive that enable building the first universally verifiable voting schemes with a perfectly private audit trail (PPAT) and practical complexity. That is: - the audit trail that is published for verifying elections guarantees everlasting privacy, and - the computational load required from the participants is only increased by a small constant factor compared to traditional voting schemes, and is optimal in the sense of Cramer, Gennaro and Schoenmakers [16]. These properties make it possible to introduce election verifiability in large scale elections as a pure benefit, that is, without loss of privacy compared to a non-verifiable scheme and at a similar level of efficiency. We propose different approaches for constructing voting schemes with PPAT from CCE, as well as two efficient CCE constructions: one is tailored for elections with a small number of candidates, while the second is suitable for elections with complex ballots. © 2013 Springer-Verlag.

References Powered by Scopus

Short Group Signatures

1534Citations
N/AReaders
Get full text

Proofs of partial knowledge and simplified design of witness hiding protocols

808Citations
N/AReaders
Get full text

A generalisation, a simplification and some applications of paillier’s probabilistic public-key system

731Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SoK: A comprehensive analysis of game-based ballot privacy definitions

69Citations
N/AReaders
Get full text

SoK: Verifiability Notions for E-Voting Protocols

62Citations
N/AReaders
Get full text

A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing

29Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Cuvelier, É., Pereira, O., & Peters, T. (2013). Election verifiability or ballot privacy: Do we need to choose? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8134 LNCS, pp. 481–498). https://doi.org/10.1007/978-3-642-40203-6_27

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 22

76%

Professor / Associate Prof. 3

10%

Lecturer / Post doc 2

7%

Researcher 2

7%

Readers' Discipline

Tooltip

Computer Science 27

84%

Mathematics 2

6%

Engineering 2

6%

Physics and Astronomy 1

3%

Save time finding and organizing research with Mendeley

Sign up for free