Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. Smyth, B. abstract bibtex We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition builds upon and strengthens earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose definitions of ballot independence as adaptations of nonmalleability and indistinguishability games for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building voting systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability could not have been detected by earlier definitions, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.
@article{smyth_ballot_nodate,
title = {Ballot secrecy: {Security} definition, sufficient conditions, and analysis of {Helios}},
abstract = {We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition builds upon and strengthens earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose definitions of ballot independence as adaptations of nonmalleability and indistinguishability games for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building voting systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability could not have been detected by earlier definitions, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.},
language = {en},
author = {Smyth, Ben},
pages = {66}
}
Downloads: 0
{"_id":"9s7scKDFtzwtLDZSv","bibbaseid":"smyth-ballotsecrecysecuritydenitionsucientconditionsandanalysisofhelios","authorIDs":[],"author_short":["Smyth, B."],"bibdata":{"bibtype":"article","type":"article","title":"Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios","abstract":"We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition builds upon and strengthens earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose definitions of ballot independence as adaptations of nonmalleability and indistinguishability games for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building voting systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability could not have been detected by earlier definitions, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.","language":"en","author":[{"propositions":[],"lastnames":["Smyth"],"firstnames":["Ben"],"suffixes":[]}],"pages":"66","bibtex":"@article{smyth_ballot_nodate,\n\ttitle = {Ballot secrecy: {Security} definition, sufficient conditions, and analysis of {Helios}},\n\tabstract = {We propose a definition of ballot secrecy as an indistinguishability game in the computational model of cryptography. Our definition builds upon and strengthens earlier definitions to ensure ballot secrecy is preserved in the presence of an adversary that controls ballot collection. We also propose definitions of ballot independence as adaptations of nonmalleability and indistinguishability games for asymmetric encryption. We prove relations between our definitions. In particular, we prove ballot independence is sufficient for ballot secrecy in voting systems with zero-knowledge tallying proofs. Moreover, we prove that building voting systems from non-malleable asymmetric encryption schemes suffices for ballot secrecy, thereby eliminating the expense of ballot-secrecy proofs for a class of encryption-based voting systems. We demonstrate applicability of our results by analysing the Helios voting system and its mixnet variant. Our analysis reveals that Helios does not satisfy ballot secrecy in the presence of an adversary that controls ballot collection. The vulnerability could not have been detected by earlier definitions, because they do not consider such adversaries. We adopt non-malleable ballots as a fix and prove that the fixed system satisfies ballot secrecy.},\n\tlanguage = {en},\n\tauthor = {Smyth, Ben},\n\tpages = {66}\n}\n\n","author_short":["Smyth, B."],"key":"smyth_ballot_nodate","id":"smyth_ballot_nodate","bibbaseid":"smyth-ballotsecrecysecuritydenitionsucientconditionsandanalysisofhelios","role":"author","urls":{},"downloads":0,"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/21h","creationDate":"2020-05-22T18:11:30.344Z","downloads":0,"keywords":[],"search_terms":["ballot","secrecy","security","nition","cient","conditions","analysis","helios","smyth"],"title":"Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios","year":null,"dataSources":["NpxDwkFvCjNmGYFSj"]}