Ballot permutations in prêt à voter

  • Authors:
  • Peter Y. A. Ryan;Vanessa Teague

  • Affiliations:
  • Dept. Computer Science and Communications, University of Luxembourg;Dept. Computer Science and Software Engineering, University of Melbourne

  • Venue:
  • EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Voter that uses Paillier encryption allows general permutations of candidates on the ballot, rather than just cyclic shifts. This improves the robustness of the system against an adversary who tries to alter checkmarks on ballots before they are posted to the bulletin board. Even if the adversary could predict which voters would fail to check their vote on the bulletin board, the best they could do would be to choose another random candidate. By contrast, when using only cyclic shifts the adversary can systematically shift a biased distribution from one candidate to another. We show in this note that the Paillier version of Prêt à Voter with full permutations of the candidates is not receipt-free when the number of possible permutations is much larger than the number of voters, and we propose a construction that addresses this issue while retaining the defence against an adversary who can shift checkmarks.