TY - GEN
T1 - Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
AU - Fraser, Ashley
AU - Quaglia, Elizabeth
PY - 2021/7/21
Y1 - 2021/7/21
N2 - Protecting the privacy of voters is a basic requirement of any electronic voting scheme, and formal definitions can be used to prove that a scheme satisfies privacy. In this work, we provide new game-based definitions of ballot secrecy for electronic voting schemes. First, we propose an intuitive definition in the honest model, i.e., a model in which all election officials are honest. Then, we show that this definition can be easily extended to the malicious ballot box setting and a setting that allows for a distributed tallier. In fact, to the best of our knowledge, we provide the first game-based definition of ballot secrecy that models both a malicious ballot box and a malicious subset of talliers. We demonstrate that our definitions of ballot secrecy are satisfiable, defining electronic voting scheme constructions which we prove satisfy our definitions. Finally, we revisit existing definitions, exploring their limitations and contextualising our contributions to the field.
AB - Protecting the privacy of voters is a basic requirement of any electronic voting scheme, and formal definitions can be used to prove that a scheme satisfies privacy. In this work, we provide new game-based definitions of ballot secrecy for electronic voting schemes. First, we propose an intuitive definition in the honest model, i.e., a model in which all election officials are honest. Then, we show that this definition can be easily extended to the malicious ballot box setting and a setting that allows for a distributed tallier. In fact, to the best of our knowledge, we provide the first game-based definition of ballot secrecy that models both a malicious ballot box and a malicious subset of talliers. We demonstrate that our definitions of ballot secrecy are satisfiable, defining electronic voting scheme constructions which we prove satisfy our definitions. Finally, we revisit existing definitions, exploring their limitations and contextualising our contributions to the field.
UR - https://link.springer.com/chapter/10.1007/978-3-030-81652-0_26
M3 - Conference contribution
SN - 978-3-030-81651-3
VL - 12804
T3 - Lecture Notes in Computer Science
SP - 670
EP - 697
BT - Selected Areas in Cryptography (SAC) 2020
PB - Springer, [Cham]
T2 - Selected Areas in Cryptography (SAC) 2020
Y2 - 21 October 2020 through 23 October 2020
ER -