applied cryptography - protocols, algorithms, and source code in c

If e is the encryption function r i is a random

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ch different vote, the list of all Ek(I,v) values that contained that vote. (9) If a voter observes that his vote is not properly counted, he protests by sending the CTF: I,Ek(I,v),d (10) If a voter wants to change his vote (possible, in some elections) from v to v‘, he sends the CTF: I,Ek(I,v‘),d A different voting protocol uses blind signatures instead of ANDOS, but is essentially the same [585]. Steps (1) through (3) are preliminary to the actual voting. Their purpose is to find out and publicize the total number of actual voters. Although some of them probably will not participate, it reduces the ability of the CTF to add fraudulent votes. In step (4), it is possible for two voters to get the same identification number. This possibility can be minimized by having far more possible identification numbers than actual voters. If two voters submit votes with the same identification tag, the CTF generates a new identification number, I’, chooses one of the two votes, and publishes: I’,Ek(I,v) The owner of that vote recognizes it and sends in a second vote, by repeating step (5), with the new identification number. Step (6) gives each voter the capability to check that the CTF received his vote accurately. If his vote is miscounted, he can prove his case in step (9). Assuming a voter’s vote is correct in step (6), the message he sends in step (9) constitutes a proof that his vote is miscounted. One problem with the protocol is that a corrupt CTF could allocate the votes of people who respond in step (2) but who do not actually vote. Another problem is the complexity of the ANDOS protocol. The authors recommend dividing a large population of voters into smaller populations, such as election districts. Another, more serious problem is that the CTF can neglect to count a vote. This problem cannot be resolved: Alice claims that the CTF intentionally neglected to count her vote, but the CTF claims that the voter never voted. Voting without a Central Tabulating Facility The follow...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online