3.2.4 Verifying Results
The verification protocol implemented by our
scheme allows voters to verify that their votes did
indeed reach the proper electoral authorities (note
that this is the verifiability level found in
conventional elections). In order to perform the
verification process, this scheme needs both the
voter’s voting receipt generated during the vote
casting period and the list of receipt Ids retrieved
and published by the Electoral Board.
The voter looks for the receipt Id, contained in
his/her voting receipt, in the published list of receipt
Ids corresponding to all valid votes received and
decrypted. With this kind of verification, the voter
can check that his/her particular vote was provided
as input to the counting process (i.e. satisfying the
“counted as cast” requirement).
Voters whose receipt identifier does not appear
in the published results can issue a public objection
by presenting their voting receipt. Such an objection
does not compromise the voter’s privacy since a
vote’s contents are not needed to verify its validity.
Furthermore, individual verifiability can also
identify (even miniscule) manipulations of the tally,
including the case where only a small percentage of
voters verify their own voting receipts. An example
may serve to illustrate the effectiveness of individual
verifiability in detecting general manipulations of
the election results: In an election with 2,000 cast
votes, only 30 voters would be required to verify the
presence of their own votes in the tabulated results
in order to achieve a more than 90% probability of
detecting a manipulation of just 150 of the ballots. If
the number of voters that verify their respective
votes in this election would double (i.e. increase to
just 60 voters), the probability for detection of vote
manipulation would rise to more than 99%.
4 CONCLUSIONS
In this paper, we have presented a method which
satisfies both verification requirements. The “cast as
intended” requirement can be satisfied through an
independent verification application. It involves
components that allow voters to verify the voting
application integrity, as well as the correct inclusion
of their votes in the final tally and publication of the
election results.
The verification of the votes presence after being
decrypted (i.e. “counted as cast” verification) is
achieved by using cryptographically protected
voting receipts. These voting receipts are resistant to
manipulations by voters since they are digitally
signed by an authority (i.e. the Voting Service) that
is under the control of the election authorities. The
authenticity of the receipts can also be validated by
using this digital signature, preventing voters from
manipulating their voting receipts. Finally, bogus
receipts cannot be generated by individuals since
they require collaboration of the voter and the
election authorities.
Furthermore, these receipts also maintain voter
privacy and do not facilitate coercion and vote-
buying practices since they do not reveal any
information about the vote.
Finally, the voter verification approach that we
propose also facilitates, with high probability, the
detection of small vote manipulations by merely
verifying a small percentage of the voting receipts.
REFERENCES
Chaum, David. 1981. “Untraceable electronic mail, return
addresses and digital pseudonyms”. Comms. of the
ACM, Vol. 24 , Issue 2, pp. 84-88. February 1981.
Chaum, David. 2004. “Secret-Ballot Receipts: True Voter-
Verifiable Elections”. IEEE Security and Privacy, pp.
38-47. January-February 2004.
Cranor, L.F., Cytron, R.K. 1997. “Sensus: A security-
Conscious Electronic Polling System for the Internet”.
Proceedings of the Hawaii International Conference
on Systems Sciences. 1997.
Malkhi, D., Margo, O., and Pavlov, E. 2002. E-voting
without 'Cryptography', FC 2002.
Mercuri, R. 2002 “A better ballot box?” IEEE Spectrum
Online, October 2002.
Neff, Andy. 2004. “Practical High Certainty Intent
Verification for Encrypted Votes” Retrieved March,
19, 2007, from http://www.votehere.com/vhti/
documentation/vsv-2.0.3638.pdf
Riera, A., Puiggali, J., Brown, P. 2003. “Applied
Cryptography Enabling Trustworthy Electronic
Voting”. Workshop on Voter Verifiable Elections,
Denver, July 2003.
Sako, K. 1994. “Electronic voting scheme allowing open
objection to the tally”. In IEICE Trans. Fund. of
Electronics, Comm. Comp. Sci. pp. 24-30.
VVSG’05 Electoral Assistance Commission. Voluntary
Voting Systems Guidelines, February, 2006
SECRYPT 2007 - International Conference on Security and Cryptography
336