Threat analysis of a practical voting scheme with receipts

  • Authors:
  • Sebastien Foulle;Steve Schneider;Jacques Traoré;Zhe Xia

  • Affiliations:
  • France Telecom, Orange Labs, Caen Cedex, France;Department of Computing, University of Surrey, Guildford, Surrey, UK;France Telecom, Orange Labs, Caen Cedex, France;Department of Computing, University of Surrey, Guildford, Surrey, UK

  • Venue:
  • VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Kutylowski et al. have introduced a voter-verifiable electronic voting scheme "a practical voting scheme with receipts", which provides each voter with a receipt. The voter can use her receipt to check whether her vote has been properly counted in the final tally, but she cannot use the receipt to prove others how she has voted. Another interesting property of this scheme is that, thanks to the repetitive robustness mix network, the ballot tallying phase only needs to be audited if the final results fail to achieve some conditions. However, we will show that this scheme is vulnerable to some threats, adversaries can not only violate voter privacy, but also forge the election result.