SlideShare a Scribd company logo
1 of 29
Download to read offline
Electronic Voting
in the Standard Model
Semesterarbeit
SS03
Thomas Briner Betreuung: Martin Hirt
Vote v
Voter Authority
Bulletin Board
SKA
Homomorphic Encryption
E(v1
) ⊕ E(v2
) = E(v1
+ v2
)
Bulletin Board
SKA
Bulletin Board
SKA
Bulletin Board
SKA
randomness
Bulletin Board
1
,...,TN
)
Bulletin Board
1
,...,TN
)
e = E(v,α)
homomorphic
encryption
v
blinding
ē
SKA
ē ē
ē ē
homomorphic
encryption
v
blinding
ē
0 1 0 0 0 0 0
Cand 1 Cand LCand 2 .....
e E(0) E(1) E(0) E(0) E(0) E(0) E(0)
E(0) E(0) E(0) E(0) E(0) E(1) E(0)
homomorphic encryption
v
blinding with correct key
ē
e
casted vote
encrypted and blinded vote
as sent in ballot
homomorphic encryption
v
blinding with correct key
ē
e
v'
e'
casted vote
homomorphic encryption
blinding with fake key
claimed vote
encrypted and blinded vote
as sent in ballot
ē
casted voteclaimed vote
ballot = (voter ID,
vote ID,
encrypted and permuted vote ,ē
validity proof,
tag,
signature )
encrypted permuted vote ē
tagT
key = ax + b
P
permutation π
encrypted permuted vote ē
tagT'
key = ax + b
P
permutation π
permutation π'
P
tagT
key = ax + b
encrypted permuted vote , permutationē π
tagT
encrypted permuted vote , permutationē π '
tagT
claimed keys
Possible States for each Voter
empty: No correctly signed ballot
invalid: One or more correctly signed but
only invalid ones
valid: Exactly one correctly signed and valid
double: More than one correctly signed and
valid ones
List of
Accusations
The Voter's View
 
Receives letter with a permutation and a
key
 
Chooses his vote
 
Encrypts his vote
 
Permutes the encrypted vote
 
Sends it to at least one honest authority
 
Generates fake keys for each permutation
he wants to claim
 
“Proves” to the votebuyer that he has
casted the desired vote
Properties of this Protocol
Privacy: Yes!
Availability: Yes!
Correctness: Not completely,
detection of irregularities
but no prevention
Receipt-freeness:
Yes!
E
PKA(v)
E
PKA(v)
Vielen Dank für die Aufmerksamkeit!

More Related Content

Viewers also liked

CE-Symm, protein symmetry, and the evolution of protein folds
CE-Symm, protein symmetry, and the evolution of protein foldsCE-Symm, protein symmetry, and the evolution of protein folds
CE-Symm, protein symmetry, and the evolution of protein foldsDouglas Myers-Turnbull
 
Fair Lending Testing and Analysis - Made Easy
Fair Lending Testing and Analysis - Made EasyFair Lending Testing and Analysis - Made Easy
Fair Lending Testing and Analysis - Made EasyDavid Gilbert
 
Physics Data Processing - The online connection
Physics Data Processing - The online connectionPhysics Data Processing - The online connection
Physics Data Processing - The online connectionSander Klous
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on CloudSupriya .
 
Cyber Café Community Bulletin 11 16-12
Cyber Café Community Bulletin 11 16-12Cyber Café Community Bulletin 11 16-12
Cyber Café Community Bulletin 11 16-12Claire A. Murray
 
Realtime processing with storm presentation
Realtime processing with storm presentationRealtime processing with storm presentation
Realtime processing with storm presentationGabriel Eisbruch
 
Electronic Bulletin Board Project
Electronic Bulletin Board ProjectElectronic Bulletin Board Project
Electronic Bulletin Board ProjectJulie Flodman
 
Introduction data structure for GraphDB
Introduction data structure for GraphDBIntroduction data structure for GraphDB
Introduction data structure for GraphDBshunya kimura
 
A Simple Pledge: towards ssustainable practice
A Simple Pledge: towards ssustainable practiceA Simple Pledge: towards ssustainable practice
A Simple Pledge: towards ssustainable practiceSamuel Mann
 
Bachir el nakib nosto vostro-loro accounts
Bachir el nakib nosto vostro-loro accountsBachir el nakib nosto vostro-loro accounts
Bachir el nakib nosto vostro-loro accountsBachir El-Nakib, CAMS
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeVenkatesh Devam ☁
 
The future of mobile payments - the importance of value networks and value ad...
The future of mobile payments - the importance of value networks and value ad...The future of mobile payments - the importance of value networks and value ad...
The future of mobile payments - the importance of value networks and value ad...Stefan Ascherl
 
Key terms done
Key terms doneKey terms done
Key terms donenileshsen
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Types of processing
Types of processingTypes of processing
Types of processingMirza Ćutuk
 

Viewers also liked (19)

CE-Symm, protein symmetry, and the evolution of protein folds
CE-Symm, protein symmetry, and the evolution of protein foldsCE-Symm, protein symmetry, and the evolution of protein folds
CE-Symm, protein symmetry, and the evolution of protein folds
 
Fair Lending Testing and Analysis - Made Easy
Fair Lending Testing and Analysis - Made EasyFair Lending Testing and Analysis - Made Easy
Fair Lending Testing and Analysis - Made Easy
 
SFS (Secure File System)
SFS (Secure File System)SFS (Secure File System)
SFS (Secure File System)
 
Physics Data Processing - The online connection
Physics Data Processing - The online connectionPhysics Data Processing - The online connection
Physics Data Processing - The online connection
 
Secure File Sharing on Cloud
Secure File Sharing on CloudSecure File Sharing on Cloud
Secure File Sharing on Cloud
 
Risk management Planing
Risk management PlaningRisk management Planing
Risk management Planing
 
Cyber Café Community Bulletin 11 16-12
Cyber Café Community Bulletin 11 16-12Cyber Café Community Bulletin 11 16-12
Cyber Café Community Bulletin 11 16-12
 
Realtime processing with storm presentation
Realtime processing with storm presentationRealtime processing with storm presentation
Realtime processing with storm presentation
 
Ring topologoy
Ring  topologoyRing  topologoy
Ring topologoy
 
Electronic Bulletin Board Project
Electronic Bulletin Board ProjectElectronic Bulletin Board Project
Electronic Bulletin Board Project
 
Introduction data structure for GraphDB
Introduction data structure for GraphDBIntroduction data structure for GraphDB
Introduction data structure for GraphDB
 
A Simple Pledge: towards ssustainable practice
A Simple Pledge: towards ssustainable practiceA Simple Pledge: towards ssustainable practice
A Simple Pledge: towards ssustainable practice
 
Bachir el nakib nosto vostro-loro accounts
Bachir el nakib nosto vostro-loro accountsBachir el nakib nosto vostro-loro accounts
Bachir el nakib nosto vostro-loro accounts
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
 
The future of mobile payments - the importance of value networks and value ad...
The future of mobile payments - the importance of value networks and value ad...The future of mobile payments - the importance of value networks and value ad...
The future of mobile payments - the importance of value networks and value ad...
 
Key terms done
Key terms doneKey terms done
Key terms done
 
Overview of ERP System
Overview of ERP SystemOverview of ERP System
Overview of ERP System
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Types of processing
Types of processingTypes of processing
Types of processing
 

More from Thomas Briner

5-Systemtest-Automatisierung_20160519
5-Systemtest-Automatisierung_201605195-Systemtest-Automatisierung_20160519
5-Systemtest-Automatisierung_20160519Thomas Briner
 
4-Testcasedesign_20160519
4-Testcasedesign_201605194-Testcasedesign_20160519
4-Testcasedesign_20160519Thomas Briner
 
3-UnitTesting_20160518
3-UnitTesting_201605183-UnitTesting_20160518
3-UnitTesting_20160518Thomas Briner
 
1-Intro-2-ET_20160516
1-Intro-2-ET_201605161-Intro-2-ET_20160516
1-Intro-2-ET_20160516Thomas Briner
 
Perfect Forward Secrecy - Next Step in Information Security
Perfect Forward Secrecy - Next Step in Information SecurityPerfect Forward Secrecy - Next Step in Information Security
Perfect Forward Secrecy - Next Step in Information SecurityThomas Briner
 
Mobile Computing für die öffentliche Hand: Durchstarten ohne Bruchlandung
Mobile Computing für die öffentliche Hand: Durchstarten ohne BruchlandungMobile Computing für die öffentliche Hand: Durchstarten ohne Bruchlandung
Mobile Computing für die öffentliche Hand: Durchstarten ohne BruchlandungThomas Briner
 
Mobile Prozesse in der Verwaltung – mehr als nur Apps und Devices
Mobile Prozesse in der Verwaltung – mehr als nur Apps und DevicesMobile Prozesse in der Verwaltung – mehr als nur Apps und Devices
Mobile Prozesse in der Verwaltung – mehr als nur Apps und DevicesThomas Briner
 
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...Thomas Briner
 
Testgetriebene Datenmigration
Testgetriebene DatenmigrationTestgetriebene Datenmigration
Testgetriebene DatenmigrationThomas Briner
 
Mobile Computing verlangt nach neuen Denkansätzen
Mobile Computing verlangt nach neuen DenkansätzenMobile Computing verlangt nach neuen Denkansätzen
Mobile Computing verlangt nach neuen DenkansätzenThomas Briner
 
Sicherheit im Mobile Computing
Sicherheit im Mobile ComputingSicherheit im Mobile Computing
Sicherheit im Mobile ComputingThomas Briner
 
System Test Automation
System Test AutomationSystem Test Automation
System Test AutomationThomas Briner
 
Compiler for Zero-Knowledge Proof-of-Knowledge Protocols
Compiler for Zero-Knowledge Proof-of-Knowledge ProtocolsCompiler for Zero-Knowledge Proof-of-Knowledge Protocols
Compiler for Zero-Knowledge Proof-of-Knowledge ProtocolsThomas Briner
 
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012Thomas Briner
 

More from Thomas Briner (14)

5-Systemtest-Automatisierung_20160519
5-Systemtest-Automatisierung_201605195-Systemtest-Automatisierung_20160519
5-Systemtest-Automatisierung_20160519
 
4-Testcasedesign_20160519
4-Testcasedesign_201605194-Testcasedesign_20160519
4-Testcasedesign_20160519
 
3-UnitTesting_20160518
3-UnitTesting_201605183-UnitTesting_20160518
3-UnitTesting_20160518
 
1-Intro-2-ET_20160516
1-Intro-2-ET_201605161-Intro-2-ET_20160516
1-Intro-2-ET_20160516
 
Perfect Forward Secrecy - Next Step in Information Security
Perfect Forward Secrecy - Next Step in Information SecurityPerfect Forward Secrecy - Next Step in Information Security
Perfect Forward Secrecy - Next Step in Information Security
 
Mobile Computing für die öffentliche Hand: Durchstarten ohne Bruchlandung
Mobile Computing für die öffentliche Hand: Durchstarten ohne BruchlandungMobile Computing für die öffentliche Hand: Durchstarten ohne Bruchlandung
Mobile Computing für die öffentliche Hand: Durchstarten ohne Bruchlandung
 
Mobile Prozesse in der Verwaltung – mehr als nur Apps und Devices
Mobile Prozesse in der Verwaltung – mehr als nur Apps und DevicesMobile Prozesse in der Verwaltung – mehr als nur Apps und Devices
Mobile Prozesse in der Verwaltung – mehr als nur Apps und Devices
 
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...
Tour d'horizon Mobile Computing: Vom Hype zum Werkzeug - Mobile Computing im ...
 
Testgetriebene Datenmigration
Testgetriebene DatenmigrationTestgetriebene Datenmigration
Testgetriebene Datenmigration
 
Mobile Computing verlangt nach neuen Denkansätzen
Mobile Computing verlangt nach neuen DenkansätzenMobile Computing verlangt nach neuen Denkansätzen
Mobile Computing verlangt nach neuen Denkansätzen
 
Sicherheit im Mobile Computing
Sicherheit im Mobile ComputingSicherheit im Mobile Computing
Sicherheit im Mobile Computing
 
System Test Automation
System Test AutomationSystem Test Automation
System Test Automation
 
Compiler for Zero-Knowledge Proof-of-Knowledge Protocols
Compiler for Zero-Knowledge Proof-of-Knowledge ProtocolsCompiler for Zero-Knowledge Proof-of-Knowledge Protocols
Compiler for Zero-Knowledge Proof-of-Knowledge Protocols
 
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012
Überleben als embedded Tester im Scrum Team - SwissTestingDay 2012
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Electronic Voting in the Standard Model