Abstract
E-polling systems are a fundamental component of any e-democracy system as they represent the most appropriate tool for fostering citizens participation to public debates. Contrarily to e-voting protocols, they are characterized by less stringent security requirements in particular they can tolerate errors affecting a small percentage of votes, without the compromision of the final result. Thus the construction of accurate and privacy respectful e-polling protocols is an objective which should be pursued by the research community as it is more close than the construction of practical e-voting protocols. However so far all the research efforts have been spent on the construction of e-voting protocols and the existing e-polling protocols are not respectful of the most elementary security and privacy rules. In this paper we propose a simple protocol for an accurate and anonymous e-polling system. More precisely our protocol satisfies the following properties: a vote cannot be altered, duplicated, or removed without being detected, votes remain anonymous. Moreover voters will be able to measure the level of trust of the process and its accuracy by verifying that their own votes have been counted correctly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proceedings of the Twenty-sixth Annual ACM Symposium on the Theory of Computing, pp. 544–553 (1994)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Chaum, D.: Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 177–182. Springer, Heidelberg (1988)
Cohen, J.D.: Improving privacy in cryptographic elections. Tech. Rep. YALEU/DCS/TR-454, Yale University (February 1986)
Cranor, L.F., Cytron, R.K.: Sensus: A security-Conscious Electronic polling system for Internet. In: Proceedings of the Hawaii International Conference on System sciences, Hawaii (1997)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Karro, J., Wang, J.: Towards a practical, secure and very large scale online Election. In: Proceedings of fifteenth Computer Security Applications Conference, pp. 161–169 (1999)
Nurmi, H., Salomaa, A., Santean, L.: Secret ballot elections in computer networks. Computers & Security 36(10), 553–560 (1991)
Reiter, M.K., Rubin, A.D.: Anonymous Web transactions with Crowds. Commun. ACM 42(2), 0001–0782, 32–48 (1999)
rfc 2246 T. Dierks C. Allen Certicom (January 1999)
Blind signatures for untraceable payments. In: Advances in criptology Cripto 1982. LCNS, pp. 199–203 (1982)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communication of the ACM 28(10), 1030 (1985)
Hirt, M., Sako, K.: Efficient Receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539–556. Springer, Heidelberg (2000)
Horster, P., Michels, M., Petersen, H.: Blind multi-signature schemes and their relevance to electronic voting. In: Proc. 11th Annual Computer Security Applications Conference, New Orleans. IEEE Press, Los Alamitos (1995)
Park, C., Itoh, K., Kurusawa, K.: ALL-nothing Election scheme and anonymous channel. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 248–259. Springer, Heidelberg (1994)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 392–403. Springer, Heidelberg (1995)
Jakobson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Boneh, D. (ed.) USENIX 2002, pp. 339–353 (2002)
Sako, K., Kilian, J.: Secure voting using partial compatible homomorphisms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 248–259. Springer, Heidelberg (1994)
Damgrd, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
Baudron, O., Forque, P., Pointcheval, D., Poupard, G., Stern, J.: Practical multicandidate election system. In: PODC 2001, pp. 274–283. ACM, New York (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bruschi, D., Fovino, I.N., Lanzi, A. (2005). A Protocol for Anonymous and Accurate E-Polling. In: Böhlen, M., Gamper, J., Polasek, W., Wimmer, M.A. (eds) E-Government: Towards Electronic Democracy. TCGOV 2005. Lecture Notes in Computer Science(), vol 3416. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32257-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-32257-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25016-6
Online ISBN: 978-3-540-32257-3
eBook Packages: Computer ScienceComputer Science (R0)