2020 IEEE European Symposium on Security and Privacy (EuroS&P) 2020
DOI: 10.1109/eurosp48549.2020.00022
|View full text |Cite
|
Sign up to set email alerts
|

Ordinos: A Verifiable Tally-Hiding E-Voting System

Abstract: Modern electronic voting systems (e-voting systems) are designed to provide not only vote privacy but also (end-to-end) verifiability. Several verifiable e-voting systems have been proposed in the literature, with Helios being one of the most prominent ones.Almost all such systems, however, reveal not just the voting result but also the full tally, consisting of the exact number of votes per candidate or even all single votes. There are several situations where this is undesirable. For example, in elections wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 47 publications
0
23
0
Order By: Relevance
“…For the Paillier-based system that we have presented it would be natural to add the tally system from Ordinos [12] since this is also based on Paillier encryption. Ordinos will only reveal the winner or the ranking of the candidates in the election, and will thus help for coercion-resistance in the case where there are candidates which expected to only get few or no votes.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the Paillier-based system that we have presented it would be natural to add the tally system from Ordinos [12] since this is also based on Paillier encryption. Ordinos will only reveal the winner or the ranking of the candidates in the election, and will thus help for coercion-resistance in the case where there are candidates which expected to only get few or no votes.…”
Section: Discussionmentioning
confidence: 99%
“…This algorithm is linear in the bit length, i.e. logarithmic in the security parameter, and can be made public verifiable [12]. Using this technique allows us to do the weeding process secure and efficient, but at the cost of all ballots being submitted with a voter identifier.…”
Section: Paillier Instantiationmentioning
confidence: 99%
“…In this section, we carry out a rigorous analysis of the vote privacy of Epoque and show that the privacy level of Epoque is ideal. For this purpose, we use the privacy definition for e-voting protocols proposed in [51] which has already been used to analyze a number of further voting protocols and mix nets [47]- [49], [51], [52].…”
Section: Privacymentioning
confidence: 99%
“…erefore, in practical application, the secure e-voting scheme needs to satisfy some necessary security requirements to protect the privacy of ballot, such as freedom (no one can be forced to cast a certain vote); fairness (no one can use more than his own votes to influence the tallying result); confidentiality (no one can know other voter's content except himself ); coercion resistance [7][8][9][10] (the voter proves nothing about the content of his ballot to others); verifiability [11,12] (every voter can verify if his ballot is correctly tallied, and any participant can verify the correctness of tallying result).…”
Section: Introductionmentioning
confidence: 99%