Abstract
Anonymity and verifiability are crucial security requirements for voting. Still, they seem to be contradictory, and confusion exists about their precise meanings and compatibility. In this paper, we resolve the confusion by showing that both can be expressed in terms of (un)linkability: while anonymity requires unlinkability of voter and vote, verifiability requires linkability of voters and election result. We first provide a conceptual model which captures anonymity as well as verifiability. Second, we express the semantics of (un)linkability in terms of (in)distinguishability. Third, we provide an adversary model that describes which capabilities the attacker has for establishing links. These components form a comprehensive model for describing and analyzing voting system security. In a case study we use our model to analyze the security of the voting scheme Prêt à Voter. Our work contributes to a deeper understanding of anonymity and verifiability and their correlation in voting.
Original language | Undefined |
---|---|
Title of host publication | 12th International Conference Information and Communications Security, ICICS 2010 |
Editors | Miguel Soriano, Sihan Qing, Javier López |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 296-310 |
Number of pages | 15 |
ISBN (Print) | 978-3-642-17649-4 |
DOIs | |
Publication status | Published - 2010 |
Event | 12th International Conference on Information and Communications Security, ICICS 2010 - Barcelona, Spain Duration: 15 Dec 2010 → 17 Dec 2010 Conference number: 12 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer Verlag |
Volume | 6476 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 12th International Conference on Information and Communications Security, ICICS 2010 |
---|---|
Abbreviated title | ICICS |
Country/Territory | Spain |
City | Barcelona |
Period | 15/12/10 → 17/12/10 |
Keywords
- IR-75062
- METIS-276726
- Anonymity
- E-voting
- EWI-19020
- Unlinkability
- verifiability
- SCS-Cybersecurity
- adversary model