Homomorphic RSA Tallying and Its Randomization for e-Voting

2010-10-01
Yucel, Okan
Baykal, Nazife
Contemporary e-voting schemes use either mix networks or homomorphic tallying to preserve the anonymity of votes. Homomorphic addition property of a public key encryption algorithm provides anonymity by allowing joint decryption of the vote sums at the tallying office; instead of separate decryption of each encrypted vote. Exponential ElGamal and Paillier algorithms are additively homomorphic that makes them suitable for homomorphic tallying. Alternatively, RSA and ElGamal algorithms are not additively homomorphic but they have the property of homomorphic multiplication, so that decryption of the product of encrypted messages yields the product of messages. In this work, we show that e-voting with multiplicative homomorphic RSA tallying is possible if the algorithm is properly randomized and each candidate is associated with a unique prime number on the electronic ballot. We explain how the unique prime factorization of the vote product can be employed to compute the individual vote counts and discuss the feasibility of such a system. The absence of random parameters in the RSA algorithm is a major disadvantage, especially within the context of e-voting, where each voter uses the public key of the tallying authority and the number of possible messages to be encrypted is equal to the limited number of candidates. Although in different applications, the RSA algorithm is randomized by adding random padding bits to the plaintext; this approach doesn't work for the proposed homomorphic tallying, since a randomization that would change the unique prime factorization in the vote product is not allowable. To solve this problem, we propose new randomizations for homomorphic RSA tallying. We comment on implementation details such as cancellation of the randomization load and size of the RSA modulus with respect to the voter set.
6th International Conference on e-Government

Suggestions

Pseudo-voter identity (PVID) scheme for e-voting protocols
Cetinkaya, Orhan; Doğanaksoy, Ali (2007-04-13)
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communication channels anonymous in order to keep voter's identity hidden and many protocols have been proposed to construct anonymous communication channels. On the other hand, instead of making channel anonymous if we provide anonymous credentials to voter, we can easily hide voter's identity without any need of anonymous channels. This pap...
Auditable and verifiable electronic voting with homomorphic RSA tallying
Yücel, Okan; Baykal, Nazife; Department of Information Systems (2010)
In this work, we investigate the general structure and the concepts behind the contemporary electronic voting schemes, with special emphasis on voter verifiable preferential voting, homomorphic tallying and voter privacy. We firstly propose a modification in the Single Transferable Voting (STV) method to be applied to large scale elections with electoral barriers. Our proposal prevents the loss of votes and distributes them securely to the second or higher choices of their voters. This method is most suitab...
Voter Verifiable and Single Transferable Electronic Voting for Elections with Electoral Barriers
Yucel, Okan; Baykal, Nazife (2009-06-30)
"Voter verifiability" is a notion offered by some electronic voting schemes, which develops into an important issue of democracy in the electronic world. The idea is to endow each voter with the facility of verifying that his vote is counted correctly. The check mechanism for the correct count of the vote can be provided by means of a voting receipt. On the other hand, whenever one has a receipt that serves to check the correct casting and tallying of the vote, it can also be used as the proof for the conte...
Analysis of security requirements for cryptographic voting protocols (extended abstract)
Cetinkaya, Orhan (2008-03-07)
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election and it is not an easy task due to the need of achieving electronic voting security requirements. The cryptographic voting protocols use advanced cryptography to make electronic voting secure and applicable.
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
Uzunay, Yusuf; BIÇAKCI, KEMAL (2014-01-29)
The main goal in the design of ThreeBallot system was to provide an end-to-end auditable voting system in a simple way without use of cryptography to bolster voter confidence in the system. However, later it was shown that this system has significant security and usability problems. To solve these problems, in this work we propose Trusted3Ballot; an electronic ThreeBallot based voting system which uses trusted computing technology. One notable feature of the proposed system is the use of TPM remote attestat...
Citation Formats
O. Yucel and N. Baykal, “Homomorphic RSA Tallying and Its Randomization for e-Voting,” presented at the 6th International Conference on e-Government, Cape Peninsula Univ Technol, Cape Town, SOUTH AFRICA, 2010, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/56164.