首页> 外文会议>Applied Cryptography and Network Security >Evaluating Security of Voting Schemes in the Universal Composability Framework
【24h】

Evaluating Security of Voting Schemes in the Universal Composability Framework

机译:在通用可组合性框架中评估投票方案的安全性

获取原文

摘要

In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do not offer any security proof at all. As a solution to this, we suggest evaluating voting schemes in the universal composability framework. We investigate the popular class of voting schemes based on homomorphic threshold encryption. It turns out that schemes in this class realize an ideal voting functionality that takes the votes as input and outputs the result. This ideal functionality corresponds closely to the well-known ballot box model used today in manual voting. Security properties such as privacy, accuracy and robustness now follow as easy corollaries. We note that some security requirements, for instance incoercibility, are not addressed by our solution. Security holds in the random oracle model against a non-adaptive adversary. We show with a concrete example that the schemes are not secure against adaptive adversaries. We proceed to sketch how to make them secure against adaptive adversaries in the erasure model with virtually no loss of efficiency. We also briefly hint at how to achieve security against adaptive adversaries in the erasure-free model.
机译:在文献中,如果投票协议满足诸如隐私,准确性,鲁棒性等要求,则认为它们是安全的。针对所有这些要求评估投票协议可能很耗时,并且尚不清楚已知要求的列表做完了。也许由于这个原因,许多有关电子投票的论文根本没有提供任何安全证明。作为对此的解决方案,我们建议在通用可组合性框架中评估投票方案。我们研究基于同态阈值加密的流行投票方案类别。事实证明,此类中的方案实现了理想的投票功能,该功能将投票作为输入并输出结果。这种理想的功能与当今手动投票中使用的众所周知的投票箱模型非常相似。安全性,例如隐私性,准确性和鲁棒性,现在很容易推论。我们注意到,我们的解决方案未解决某些安全性要求,例如不可矫顽力。安全性在随机预言模型中针对非自适应对手。我们用一个具体的例子表明,该方案对于适应性对手并不安全。我们将继续介绍如何在擦除模型中使他们免受自适应对手的攻击,而实际上不会降低效率。我们还简要提示了如何在无擦除模型中实现针对自适应对手的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号