A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting

  • Authors:
  • Jason Keller;Joe Kilian

  • Affiliations:
  • Department of Computer Science, Rutgers University, Piscataway, USA NJ 08854;PNYLAB, LLC,

  • Venue:
  • ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
  • Year:
  • 2008

Quantified Score

Hi-index 0.04

Visualization

Abstract

Numerous methods have been proposed to conduct cryptographically secure elections. Most of these protocols focus on 1-out-of-n voting schemes. Few protocols have been devised for preferential voting systems, in which voters provide a list of rankings of the candidates, and many of those treat ballots as if they were ballots in a 1-out-of-n voting scheme. We propose a linked-list-based scheme that provides improved privacy over current schemes, hiding voter preferences that should not be revealed. For large lists of candidates we achieve improved asymptotic performance.