Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SoK: Secure E-Voting with Everlasting Privacy

View through CrossRef
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting) protocols have been proposed to address this challenge, striving for everlasting privacy. This property guarantees that even computationally unbounded adversaries cannot break privacy of past elections. The broad interest in secure e-voting with everlasting privacy has spawned a large variety of protocols over the last three decades. These protocols differ in many aspects, in particular the precise security properties they aim for, the threat scenarios they consider, and the privacy-preserving techniques they employ. Unfortunately, these differences are often opaque, making analysis and comparison cumbersome. In order to overcome this non-transparent state of affairs, we systematically analyze all e-voting protocols designed to provide everlasting privacy. First, we illustrate the relations and dependencies between all these different protocols. Next, we analyze in depth which protocols do provide secure and efficient approaches to e-voting with everlasting privacy under realistic assumptions, and which ones do not. Eventually, based on our extensive and detailed treatment, we identify which research problems in this field have already been solved, and which ones are still open. Altogether, our work offers a well - founded reference point for conducting research on secure e - voting with everlasting privacy as well as for future - proofing privacy in real - world electronic elections.
Title: SoK: Secure E-Voting with Everlasting Privacy
Description:
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future.
Numerous electronic voting (e-voting) protocols have been proposed to address this challenge, striving for everlasting privacy.
This property guarantees that even computationally unbounded adversaries cannot break privacy of past elections.
The broad interest in secure e-voting with everlasting privacy has spawned a large variety of protocols over the last three decades.
These protocols differ in many aspects, in particular the precise security properties they aim for, the threat scenarios they consider, and the privacy-preserving techniques they employ.
Unfortunately, these differences are often opaque, making analysis and comparison cumbersome.
In order to overcome this non-transparent state of affairs, we systematically analyze all e-voting protocols designed to provide everlasting privacy.
First, we illustrate the relations and dependencies between all these different protocols.
Next, we analyze in depth which protocols do provide secure and efficient approaches to e-voting with everlasting privacy under realistic assumptions, and which ones do not.
Eventually, based on our extensive and detailed treatment, we identify which research problems in this field have already been solved, and which ones are still open.
Altogether, our work offers a well - founded reference point for conducting research on secure e - voting with everlasting privacy as well as for future - proofing privacy in real - world electronic elections.

Related Results

Electronic Voting Systems
Electronic Voting Systems
In 2001, Wand and colleagues published a paper titled “The Butterfly Did It” (see Wand, et al. 2001, cited under Voting System Neutrality) in which they argue that Palm Beach Count...
Exploratory Review: Decentralized Voting System Using Blockchain
Exploratory Review: Decentralized Voting System Using Blockchain
Abstract: Electronic voting, often known as e-voting, has been utilized in various forms since the 1970s, with basic advantages over paper-based systems such as improved efficiency...
Reformulasi Sistem Pemungutan Suara Dalam Pemilihan Umum di Indonesia
Reformulasi Sistem Pemungutan Suara Dalam Pemilihan Umum di Indonesia
The aim of this research is to determine and analyze the position of e-voting in current election laws and regulations and the reformulation of the voting system in elections in In...
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
Privacy Preserving Voting Scheme Based on Blockchain Technology
Privacy Preserving Voting Scheme Based on Blockchain Technology
Democracy has made voting incredibly important in any nation due to a general scepticism of the traditional voting process. Individuals have witnessed violations of their fundament...
Online Voting System
Online Voting System
The project "Online Voting System" aims to simplify voting in any type of election. In India, presently voting is done either using ballot paper or with EVM machines. In the tradit...
Deep Learning-Based Ensemble Two-Step Classification of Medical Images Using CNN Architectures and Ensemble Methods
Deep Learning-Based Ensemble Two-Step Classification of Medical Images Using CNN Architectures and Ensemble Methods
Breast cancer remains one of the most common cancers amongst women globally. Early detection is crucial for improving survival rates. While mammography is widely used and an effect...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...

Back to Top