Adapting Helios for provable ballot privacy

David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth & Bogdan Warinschi (2011) Adapting Helios for provable ballot privacy. In ESORICS'11: 16th European Symposium on Research in Computer Security, LNCS 6879, Springer, pp. 335-354.

Download

Abstract

Recent results show that the current implementation of Helios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryption scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guarantees for the revised version of Helios (albeit from non-standard assumptions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instantiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy.

Bibtex Entry

@inproceedings{2011-provably-secure-variant-of-Helios,
	author = "David Bernhard and V\'{e}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi",
	title = "{Adapting Helios for provable ballot privacy}",
	year = "2011",
	booktitle = "ESORICS'11: 16th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity",
	publisher = "Springer",
	series = "LNCS",
	volume = "6879",
	pages = "335-354",
	doi = "10.1007/978-3-642-23822-2_19",
}