A Practical Voting Scheme Using One Server with a Secure Coprocessor Date:2010.12.26

advertisement

多媒體網路安全實驗室

A Practical Voting Scheme Using

One Server with a Secure

Coprocessor

Date:2010.12.26

Reporter: Chien-Wen Huang

出處: ICIC Express Letters Volume 3, Number 3, September 2009

多媒體網路安全實驗室

Outline

1

2

Introduction

The Requirements of E-Voting System

An Innovative Practical E-Voting Scheme

The Analysis of the Proposed Scheme

Conclusions

2

多媒體網路安全實驗室

Introduction

 Voting is common in our daily life, from electing the president to selecting committees of certain organizations .

 PIR: which hides the real purpose of inquiry of the user by querying K servers.

 Smith et al. used a secure coprocessor (SC) in their PIR solution.

 SC: is a temper-proof device with small memory; it is designed to prevent anybody from accessing its memory.

3

4

多媒體網路安全實驗室

多媒體網路安全實驗室

The Requirements of E-Voting System

1.

Eligibility: Only eligible voters are permitted to cast their ballots.

2.

Privacy: There is no association between voter’s identification and a marked ballot .

3.

Uniqueness: No voter can cast his ballot more than once.

4.

Completeness: A voter’s ballot cannot be altered, and all valid ballots are counted correctly.

5.

Fairness: No one can affect the result of voting.

5

多媒體網路安全實驗室

6.

Verifiability: Voters can verify that their ballots are counted correctly.

7.

Robustness: A voting scheme will be successful regardless of partial failure due to a malicious voter.

8.

Uncoercibility: Bribery is prevented because no voter can prove to others what he or she voted.

9.

Efficiency: The computations can be performed efficiently.

10.

Mobility

6

多媒體網路安全實驗室

An Innovative Practical E-Voting

Scheme

7

多媒體網路安全實驗室

 tamper-proof device:the information can not be detected or distorted by the server or anyone else.

 Database 1 stores the roster,identification(ID) and personal information of all voters.

 Database 2 stores the encrypted voter’s identification (ID'), a marked ballot (vote') , and the encrypted voting information (C) .

8

多媒體網路安全實驗室

 the following notations are used in the description

PK

SC

: the public key of SC

SK

SC

: the secret key of SC

PK

V

: the public key of the voter

SK

V

: the secret key of the voter

ID: the voter’s identification

ID': the encrypted voter’s identification (by hash function)

ST : the temporal storage for gotten ballot identification stored by secure coprocessor

9

多媒體網路安全實驗室

Vote: the blank ballot

Vote': the marked ballot (voted by the voter)

M: the secret message of voter’s identification information

M': the secret message of voter’s identification created by SC

C: the secret message of voting created by voters

S: the secret message of unverified ballot created by voter

10

多媒體網路安全實驗室

S': the verified message of ballot created by SC

E: the error message of verified ballot created by

SC

11

多媒體網路安全實驗室

Authentication Phase

Sign

V

=E

SKv

( ID )

Sign

SC

驗證正確表示 已收到

12

Voting Phase

多媒體網路安全實驗室

 Then, it verifies Sign

V

; if it is correct, it saves

ID' and C of the voter into Database 2

13

多媒體網路安全實驗室

Announcement Phase

 Step8:Decrypted ID’ in C is compared to the identificatio n ID’ ( 之前 HASH 的部分 )

14

Verification Phase

多媒體網路安全實驗室

C = ID’ ,Sign

Compare

V

,Vote’

Sign

V

,Vote’

 All eligible voters can get their own ( ID', C) from bulletin board system.

 If the person is the qualified voter and C is the same as in Database 2,then decrypt C .

15

多媒體網路安全實驗室

The Analysis of the Proposed Scheme

1.

Eligibility: SC verifies the voter’s identification

ID.

2.

Privacy:The voter’s identification ID' and voted ballot Vote' are encrypted by the public key

PK

SC of SC.

3.

Uniqueness: Because the voter’s ID is verified by SC, anyone will not be able to transmit repeated identification (ID) to vote twice .

16

多媒體網路安全實驗室

4.

Completeness: Although the voters’ ballots are stored in Database 2, encrypted by PK

SC

.

C =( Vote', ID',Sign

V

)are

5.

Fairness: Any illegal voter cannot pass the roster’s authentication procedure by SC (he cannot forge Sign

V of a legal voter.)

6.

Verifiability: When SC acquires S , it can decrypt S to obtain Vote', Sign

V

, ID' and C.

7.

Robustness: voter’s ID is verified by SC and no one can know any eligible voter’s voting information .

17

多媒體網路安全實驗室

8.

Uncoercibility: all voters can acquire their own

( ID', C) from bulletin board system and their ballots are verified by SC.

9.

Efficiency: This e-voting scheme is suitable for small-scale area; it can run smoothly in present server performance and internet environment.

10.

Mobility: The voters can vote through the proposed e-voting scheme at any place where they have access to the internet.

18

多媒體網路安全實驗室

Conclusions

 An innovative and practical e-voting scheme is presented for small-scale elections

 The scheme can protect voters’ personal privacy and offer secure processes throughout every phrase of an election.

 The voting scheme has practical value because of its low cost, high efficiency, and strong security

19

多媒體網路安全實驗室

Download