Skip to main content

Absolute Privacy in Voting

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Abstract

If nobody can prove (even in an all-against-one cooperation) that one did not vote with a particular cast, then one can claim anything about his cast even under oath, and has no fear of being caught. We consider the question of constructing a voting scheme that provides all participants with this “absolute” privacy.

We assume that half of the problem is already solved: The votes are evaluated so that only the result is revealed. Latest achievements of secure coprocessors are supposedly a justification for such a presumption. We prove that even under the presumption that the voting reveals nothing but a result, the privacy of an individual input can withstand an “all-against-one” attack under certain conditions only.

First condition: The function that maps a set of casts to the result of voting must be non-deterministic. Second condition (paradoxically): for any set of casts any result must be possible.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Theory and Application of Cryptographic Techniques. (1997) 103–118

    Google Scholar 

  2. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of STOC’87. (1987)

    Google Scholar 

  3. Goldreich, O.: Preface to special issue on general secure multi-party computation. http://www.wisdom.weizmann.ac.il/~oded/PS/preSI.ps (1999)

  4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84–88

    Article  Google Scholar 

  5. Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of 26th FOCS. (1985)

    Google Scholar 

  6. Cohen, J.: Improving privacy in cryptographic elections. Technical Report 454, Yale University, Department of Computer Science (1986)

    Google Scholar 

  7. Chaum, D.: Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In: Advances in Cryptology: Proc. of EuroCrypt’88, LNCS 330, SpringerVerlag. (1988) 177–182

    Google Scholar 

  8. Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Proceedings of EUROCRYPT’96, LNCS 1070. (1996)

    Google Scholar 

  9. Gerck, E.: Internet voting requirements. The Bell 1 (2000) 3–5, 11–13

    Google Scholar 

  10. Smith, S.W., Palmer, E.R., Weingart, S.H.: Using a high-performance, programmable secure coprocessor. In: Proceedings of the 2nd International Conference on Financial Cryptography, Springer-Verlag LNCS. (1998)

    Google Scholar 

  11. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proceedings of the 26th ACM Symposium on Theory of Computing. (1994) 544–553

    Google Scholar 

  12. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In Preneel, B., ed.: Advances in Cryptology-EUROCRYPT’00. Volume 1807 of Lecture Notes in Computer Science., Springer-Verlag (2000) 539–556

    Chapter  Google Scholar 

  13. Kikuchi, H., Akiyama, J., Gobioff, H., Nakamura, G.: Stochastic anonymous voting. Technical Report CMU-CS-98-112, Carnegie Mellon University (1998)

    Google Scholar 

  14. Willenborg, L., de Waal, T.: Statistical Disclosure Control in Practice. Volume 111 of Lecture Notes in Statistics. Springer-Verlag (1996)

    Google Scholar 

  15. Schneier, B.: Applied Cryptography. 2nd edn. Wiley, New York (1996)

    Google Scholar 

  16. Saari, D.G.: Basic Geometry of Voting. Springer-Verlag (1995)

    Google Scholar 

  17. Saari, D.G.: Geometry, voting, and paradoxes. Mathematics Magazine (1998) 243–259

    Google Scholar 

  18. Woodall, D.R.: An impossibility theorem for electoral systems. Discrete Mathematics (1987) 209–211

    Google Scholar 

  19. Saari, D.G.: A dictionary for voting paradoxes. Journal of Economic Theory (1989) 443–475

    Google Scholar 

  20. Nurmi, H.: Voting Paradoxes and How to Deal with Them. Springer-Verlag (1999)

    Google Scholar 

  21. Coughlin, P.J.: Probabilistic Voting Theory. Cambridge University Press (1993)

    Google Scholar 

  22. Enelow, J.M., ed.: Spatial Theory of Voting. Cambridge University Press (1984)

    Google Scholar 

  23. Enelow, J.M., Hinich, M.J., eds.: Advances in the Spatial Theory of Voting. Cambridge University Press (1990)

    Google Scholar 

  24. Samuel Merrill, I., Grofman, B.: A Unified Theory of Voting. Cambridge University Press (1999)

    Google Scholar 

  25. Martin, B.: Democracy without elections. Social Anarchism (1995-96) 18–51

    Google Scholar 

  26. Carson, L., Martin, B.: Random selection in politics. Praeger (1999)

    Google Scholar 

  27. Smith, S.W., Safford, D.: Practical private information retrieval with secure coprocessors. Technical report, IBM Research Division, T.J. Watson Research Center (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asonov, D., Schaal, M., Freytag, JC. (2001). Absolute Privacy in Voting. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics