OPTIMALLY EFFICIENT MULTI AUTHORITY SECRET BALLOT E-ELECTION SCHEME



Similar documents
Periodic Review Probabilistic Multi-Item Inventory System with Zero Lead Time under Constraints and Varying Order Cost

On the Optimality and Interconnection of Valiant Load-Balancing Networks

The dinner table problem: the rectangular case

Understanding Financial Management: A Practical Guide Guideline Answers to the Concept Check Questions

Two degree of freedom systems. Equations of motion for forced vibration Free vibration analysis of an undamped system

Maximum Entropy, Parallel Computation and Lotteries

3. Greatest Common Divisor - Least Common Multiple

THE PRINCIPLE OF THE ACTIVE JMC SCATTERER. Seppo Uosukainen

between Modern Degree Model Logistics Industry in Gansu Province 2. Measurement Model 1. Introduction 2.1 Synergetic Degree

Money Math for Teens. Introduction to Earning Interest: 11th and 12th Grades Version

Soving Recurrence Relations

Negotiation Programs

An Efficient Group Key Agreement Protocol for Ad hoc Networks

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Finance Practice Problems

Systems Design Project: Indoor Location of Wireless Devices

Annuities and loan. repayments. Syllabus reference Financial mathematics 5 Annuities and loan. repayments

Derivation of Annuity and Perpetuity Formulae. A. Present Value of an Annuity (Deferred Payment or Ordinary Annuity)

Chapter 5: Inner Product Spaces

Logistic Regression, AdaBoost and Bregman Distances

Determining the sample size

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

Over-encryption: Management of Access Control Evolution on Outsourced Data

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Mechanics 1: Work, Power and Kinetic Energy

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

Infinite Sequences and Series

1. C. The formula for the confidence interval for a population mean is: x t, which was

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

ANNUITIES SOFTWARE ASSIGNMENT TABLE OF CONTENTS... 1 ANNUITIES SOFTWARE ASSIGNMENT... 2 WHAT IS AN ANNUITY?... 2 EXAMPLE QUESTIONS...

Learning Objectives. Chapter 2 Pricing of Bonds. Future Value (FV)

1. MATHEMATICAL INDUCTION

Secure Smartcard-Based Fingerprint Authentication

Math C067 Sampling Distributions

Contact Us The College of Management - Academic Studies (COMAS ) Office of International Programs 7 Yitzhak Rabin Blvd. Rishon LeZion Israel

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

16. Mean Square Estimation

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

The force between electric charges. Comparing gravity and the interaction between charges. Coulomb s Law. Forces between two charges

Section 8.3 : De Moivre s Theorem and Applications

The Binomial Distribution

How to Encrypt Properly with RSA

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

CS103X: Discrete Structures Homework 4 Solutions

Factoring x n 1: cyclotomic and Aurifeuillian polynomials Paul Garrett <garrett@math.umn.edu>

Gauss Law. Physics 231 Lecture 2-1

On Some Functions Involving the lcm and gcd of Integer Tuples

Our aim is to show that under reasonable assumptions a given 2π-periodic function f can be represented as convergent series

Did you know that houses with CCTV are 90% less likely to be burgled? Yale now offer a range of Easy Fit CCTV systems

Hypothesis testing. Null and alternative hypotheses

Vector Calculus: Are you ready? Vectors in 2D and 3D Space: Review

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Firstmark Credit Union Commercial Loan Department

Asymptotic Growth of Functions

5 Boolean Decision Trees (February 11)

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

1240 ev nm 2.5 ev. (4) r 2 or mv 2 = ke2

Promised Lead-Time Contracts Under Asymmetric Information

Strategic Remanufacturing Decision in a Supply Chain with an External Local Remanufacturer

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

Modified Line Search Method for Global Optimization

E-Plex Enterprise Access Control System

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Project Request & Project Plan

Output Analysis (2, Chapters 10 &11 Law)

Section 11.3: The Integral Test

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Incremental calculation of weighted mean and variance

Converting knowledge Into Practice

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Domain 1: Designing a SQL Server Instance and a Database Solution

Static revisited. Odds and ends. Static methods. Static methods 5/2/16. Some features of Java we haven t discussed

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

Randomized Load Balancing by Joining and Splitting Bins

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix

Engineering Data Management


How to recover your Exchange 2003/2007 mailboxes and s if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

Domain 1 - Describe Cisco VoIP Implementations

(VCP-310)

Finding the circle that best fits a set of points

On Formula to Compute Primes. and the n th Prime

Development of Customer Value Model for Healthcare Services

Liquidity and Insurance for the Unemployed*

Transcription:

OPTIMALLY EFFICIENT MULTI AUTHORITY SECRET BALLOT E-ELECTION SCHEME G. Aja Babu, 2 D. M. Padmavathamma Lectue i Compute Sciece, S.V. Ats College fo Me, Tiupati, Idia 2 Head, Depatmet of Compute Applicatio. S.V.Uivesity, Tiupati, Idia Email: comp_mpv@svuivesity.i ABSTRACT A electoic votig scheme is a set of potocols that allow a collectio of votes to cost thei votes, while eablig a collectio of authoities to collect votes, compute the fial tally, ad commuicate the fial tally that is checked by tallies. This scheme is based o the RSA ad factoig assumptios. We apply the potocols of [CDS 88] to Guillo Quisate s idetificatio potocol [GQ 88] to costat poofs of validity fo ballots.. INTRODUCTION: A electoic scheme is a set of potocols that allow a collectio of votes to cost thei votes, while eablig a collectio of authoities to collect votes, compute the fial tally, ad commuicate the fial tally that is checked by tallies. I cyptogaphic liteatue o votig schemes, thee impotat euiemets ae idetified. Pivacy: A system maitais pivacy if:. Neithe electio authoities o ay oe ca lik ay ballot to the vote who cost it. 2. No votes ca pove that he o she voted i a paticula way. Veifiability: A system is veifiable if all votes ca idepedetly veify that thei votes have bee couted coectly without sacificig pivacy. I additio each vote must be able to veify the fial esults of the tally. Robustess: A system is obust if it esues that all the system ca ecove fom the faulty behavio of ay (easoably sized) locatio of paties. The mai cotibutio of this pape is pesetig a efficiet votig scheme that satisfies uivesal veifiability pivacy ad obustess. 2. OVERVIEW OF THE APPROACH The paties i a votig scheme ae modeled as pobabilistic polyomial time pocess. Two meas of commuicatio ae typically assumed to be available fo these paties. A bulleti boad: The commuicatio model euied fo ou electio scheme is viewed as a public boadcast chael with memoy, which is called a bulleti boad. All the commuicatios though the bulleti boad is public ad ca be ead by ay paty (icludig passive obseves). No paty ca ease ay ifomatio fom the bulleti boad. Pivate chaels:

To suppot pivate commuicatio betwee votes ad authoities. Fo this task ay secue public key ecyptio scheme is suitable. The paties of the votig scheme pefom the followig steps to eecute a electio. To cast a vote, each vote costucts a ballot as a ecyptio of the desied vote ad post the ballot to the bulleti boad. At his poit, a poof of validity is also euied that covices all paties that the posted ecyptio cotais a valid vote, without evealig it. The auhoities, how eve, ae able to decypt the ballots (because of the eta ifomatio eceived fom the vote though the pivate chael). I the ed, the fial tally is published togethe with some auiliay ifomatio to eable uivesal veifiability. Moe techically, uivesal veifiability is achieved by euiig the ecyptio fuctio to be suitably homomophic. Cetal to ou esults is the way we achieve a efficiet poof of validity fo ballots. The poof of validity shows t ay iteested paty that a ballot actually epeset a vote e.g., that it eithe epesets a yes o a o, ad othig else. To maitai pivacy fo the votes, the geeal idea is to use some sot of zeo kowledge poof. The poblem is howeve that ZK poofs usually euie a lage umbe of epetitios befoe the desied level of cofidece is achieved. The efficiecy of the whole scheme is iflueces by these poofs. Ou cotibutio ow is two fold. We use a paticula efficiet homomophic ecyptio scheme, based o -th esiduay assumptio. a umbe is a -th esidue modulo if thee eists a α such that α (mod ), moeove, by applyig the esults fom [CDS 94], the poof of validity is simple thee move potocol which is witess idistiguisible ( i fact, witess hidig as well). Istead of ZK poofs. 3. CRYPTOGRAPHIC PRIMITIVES We implemet ou electio based o -th esiduosity assumptio. A umbe is a -th esidue modulo if thee eists a α such that α (mod N). Homomophic Ecyptio with Efficiet Poof of Validity: Iitializatio: Iitialized the paametes of the scheme ae a modulus N, Which is a poduct of two lage pimes, a pime with gcd (, Ф (N)). Also a elemet h Є Z * N - ae available to all paties. The fied umbe h is ot a -th esidue modulo N. Ecyptio: A paticipat ecypts V by choosig α Є R Z N ad computes B α h v. Opeig: A paticipat ca late ope B by evealig v ad α. A veifyig paty the checks whethe B α h v ad accepts v as the ecypted value. Homomophic popety: Ecyptio is homophic i the sese that; if B ad B 2 ae ecyptios of v ad v 2 espectively, the B.B 2 is a ecyptio of (v +v 2 ) mod. Poof of kowledge fo -th esiduosity: Usig theotatios above, we peset poof of kowledge fo -th esiduosity, whee by a pope shows possessio of a α Є Z satisfyig α. 2

PROTOCOL [ α ] Pove Veifie W Є R Z * N A w a C Є R Z c w α c Figue-? a c Theoem: : The above potocol is a thee moe public coi poof of kowledge fo -th esiduosity. The poof satisfies special soud ess ad special hoest veifie zeo kowledge. Poof: Special soudess ow holds because fo ay two acceptig covesatios (a,,) ad (a, c, ), c > c, it follows that c c. Sice 0 < c c <, we have that thee eist iteges tems k, such that (c c ) k l. Hece k k k ( c c ). l l 3

k which is cotadictio to the -th esiduosity assumptio. Futhe moe, by the esult of [CDS 94], the potocol of fig(2), i a poof of kowledge that a vote kows -th esidue of B (Bh) o. Thus the veifie leas that the h VOTER Joual of Theoetical ad Applied Ifomatio Techology V V- PROTOCOL-2 vote kows α ad v {, -} such that B α h v without obtaiig ay ifomatio about actual value of v. Poof of validity: i ou votig scheme to follow, it will be the case that a vote posts a ecyptio of a value v Є {, -}. To demostate that the ecypted value is ideed is {, -} without evealig it, the vote ad the veifie eecute the followig efficiet poof of validity. VERIFIER α,, d, w 2 Є Z B α. h a (Bh) d α, 2, d 2, w Є R Z B α / h a w a 2 w 2 a 2 2 B d 2. h B, a, a 2 C C Є R Z d 2 c - d d c - d 2 2 w 2. α d 2 w. α d d, d 2,, 2 d + d 2 c a (Bh) d (Figue 2) 2 B d 2. h 4

Veifiable secet shaig: To achieve obustess efficietly, o iteactive veifiable secet shaig, efficiet solutio fo out of case is possible ca apply. Ude the -th esidusity assumptio, ou electio scheme satisfies uivesal veifiability, obustess ad pivacy. 4. SECRET BALLOT ELECTION SCHEME We ow peset ou mai esult, a secet ballot electio scheme. The paticipat i the electio scheme ae authoities. A, A 2,., A ad m votes V, V 2,.V m. The scheme woks as follows: Each vote V i pepaes a vote by adomly selectig b i {,-}. The vote fist b ecypts b i by computig B i α i i. h, whee α i Z is chose adomly, ad post B i to the bulleti boad. Subseuetly b i is cosideed as a secet which is to be shaed amog the authoities. The vote also posts poof (B i ). I the ed the aggegate value T b i educed i l module epeset the esult of the electio. Ballot Costuctio ad Vote costig : Each vote V i posts b i {,-}. I the followig.. The vote adomly chooses b i {,-} ad computes B i α i., the vote also computes poof of (B i ) also the vote computes. bi h B i (α i ) bi h, < l < 2. The vote posts B i, poof (B i ), B i, B i2,., B i to the bulleti boad. 3. All paticipats veify which the ballot B i is coectly fomed by checkig poof of (B i ). 4. The vote chooses the shaes (a ij, b ij ) Whee i l b ij j l a ij Seds (a ij, b ij ) to the authoity a j usig a pivate chael. 5. Each authoity checks the eceived shaes (a ij, b ij ) by usig that (a ij ) h b ij B ij. Tallyig : Each authoity A j posts S j, T j ad seds to the bulletei b m S j i l b i α a ij, T j ij i l Each tallie checks the shae (S j, T j ) posted by A j by veifyig that S j. m T h j i l ( B ij ) The fial stage is the tally itself. Let us deote as A {j T j is coect}. The tally is the itepolatio of the polyomial ad may be calculated as T j A T j l A{ j} l l We assume that i the successful electio, the shaes of evey vote have bee accepted by all authoities. i.e., all veificatio by j i 5

the authoities i the last step of the ballot costuctio is successful. I case a authoity eceives a false shae, the authoity may post the shae so that ay body ca veify that shae is ot coect ad that it coespods to the posted ecyptio of step (4) i the ballot costuctio. Theoem: 2 Ude the -th esiduosity assumptio, ou electio scheme saties uivesial veifiability, obustess ad pivacy. Poof: To pove uivesal veifiability, fist ote that oly ballots ae cotact o accout of theoem (). Futhe the fial tally is coect, if the step (2) of the tallyig holds fo all authoities. This deals with uivesal veifiability ad obustess. The pivacy popety ca easily pove fom the fact that the secet shaig scheme used ad the poof of validity (potocol) ae ifomatio theoetical scheme. 5. CONCLUSION We have show a vey efficiet scheme fo secue electio based o -th esiduosity assumptio. The scheme satisfies well-kow euiemets pivacy, uivesal veifiability ad obustess. [2]. [CDS-94] R.CRAMER, I. DAMGARD, AND B. SCHOENMAKERS. [3]. Poofs of patial kowledge ad simplified desig of witess hidig potocols. I Advaces I Cyptology CRYPTO 94. Volume 839 of Lectue Notes I Compute Sciece, pages 74 87, BERLIN, 994.Spige Velag. [4]. [CFSY 96] R.CRAMER, M. FRANKLIN, B. SCHOENMAKERS AND M.YUNG. [5]. Multi authoity secet ballot electios with liea wok. I Advaces I Cyptology EUROCRYPT 96, Volume 070 of Lectue Notes I Compute Sciece, pages 72 83, BERLIN, 996. Spige Velag. REFERENCES []. [BEN 87a] J. Bealoh. Cyptogaphic capsules: A disjuctive pimitive fo iteactive potocols. I advaces i cyptology CRYPTO 86, Volume 263 Of Lectue Notes I Compute Sciece, pages 23 222, BERLIN, 987. Spige Velag. 6