Abstract
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other hand each vote should be deniable to avoid coercion and vote buying.
This work presents a new verifiable and coercion-free voting scheme Bingo Voting, which is based on a trusted random number generator. As a motivation for the new scheme two coercion/vote buying attacks on voting schemes are presented which show that it can be dangerous to let the voter contribute randomness to the voting scheme.
A proof-of-concept implementation of the scheme shows the practicality of the scheme: all costly computations can be moved to a non time critical pre-voting phase.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
University of California: Reports of top-to-bottom review of voting machines (2007), http://www.sos.ca.gov/elections/elections_vsr.htm
Gonggrijp, R., Hengeveld, W.J., Bogk, A., Engling, D., Mehnert, H., Rieger, F., Scheffers, P., Wels, B.: Nedap/Groenendaal ES3 voting computer – a security analysis (2006), http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Neff, C.A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.net/vhti/documentation/vsv-2.0.3638.pdf
Reynolds, D.J.: A method for electronic voting with Coercion-free receipt. In: FEE 2005 (2005), http://www.win.tue.nl/~berry/fee2005/presentations/reynolds.ppt
Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting With Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006)
Chaum, D.: Punchscan (2006), http://punchscan.org/
Adida, B., Neff, C.A.: Ballot Casting Assurance. In: EVT 2006. Proceedings of the First Usenix/ACCURATE Electronic Voting Technology Workshop, Vancouver, BC, Canada (August 1, 2006), http://www.usenix.org/events/evt06/tech/full_papers/adida/adida.pdf
Rivest, R.L.: The ThreeBallot Voting System (2006), http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf
Popoveniuc, S., Hosp, B.: An Introduction to Punchscan. In: VSRW 2006. Threat Analyses for Voting System Categories, A Workshop on Rating Voting Methods (2006), http://vote.cs.gwu.edu/vsrw2006/papers/9.pdf
Popoveniuc, S., Hosp, B.: An Introduction to Punchscan. In: IAVoSS Workshop On Trustworthy Elections, WOTE 2006 (2006), http://punchscan.org/papers/popoveniuc_hosp_punchscan_introduction.pdf
Chaum, D., Ryan, P.Y., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Adida, B., Rivest, R.L.: Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting. In: WPES 2006. Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 29–40. ACM Press, New York (2006)
Benaloh, J.: Simple Verifiable Elections. In: EVT 2006. Proceedings of the First Usenix/ACCURATE Electronic Voting Technology Workshop, Vancouver, BC, Canada (August 1, 2006), http://www.usenix.org/events/evt06/tech/full_papers/benaloh/benaloh.pdf
Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. In: USENIX Security Symposium, pp. 339–353 (2002)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24, 84–88 (1981)
Sun Microsystems: Java Platform, Standard Edition (2006), http://java.sun.com/
Karlof, C., Sastry, N., Wagner, D.: Cryptographic Voting Protocols: A Systems Perspective. In: Proceedings of the Fourteenth USENIX Security Symposium (USENIX Security 2005), pp. 33–50 (2005)
Ryan, P.Y.A., Peacock, T.: Prêt à Voter: a Systems Perspective. Technical Report CS-TR-929, School of Computing Science, University of Newcastle (2005), http://www.cs.ncl.ac.uk/research/pubs/trs/papers/929.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bohli, JM., Müller-Quade, J., Röhrich, S. (2007). Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In: Alkassar, A., Volkamer, M. (eds) E-Voting and Identity. Vote-ID 2007. Lecture Notes in Computer Science, vol 4896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77493-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-77493-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77492-1
Online ISBN: 978-3-540-77493-8
eBook Packages: Computer ScienceComputer Science (R0)