Table 2: Timings for modular operations on a dedicated hardware.
Field size Multiplication Addition Inversion
(bits) (µs)
256 3.21 0.566 230
3072 214.05 NA NA
EC-DE(p, q) =|q|·(1.5)·
(10M(|p|) + 10A(|p|)) + I(|p|)
EC-KVE(p, q) =0.5 ·|q|·(1.5)·
(10M(|p|) + 10A(|p|)) + I(|p|)
Real Component. Let us take usually recommended
key lengths |q| = 256 and |p| = |g| = 3072 in the DL
case and |q| = |p| = 256 in the EC case (in bits). In
order to get an insight of the timings on an actual
component, we give the figures for modular multipli-
cation, addition/subtraction and inversion in Table 2.
These figures correspond to a component equipped
with a smart-card dedicated hardware efficiently im-
plementing the modular arithmetic.
Performing ballot pre-computations saves around
a third of the overall performances which is worth
mentioning.
REFERENCES
Adida, B. (2008). Helios: Web-based open-audit voting.
In van Oorschot, P. C., editor, Proceedings of the
17th USENIX Security Symposium, pages 335–348.
USENIX Association.
Adida, B., de Marneffe, O., Pereira, O., and Quisquater,
J.-J. (2009). Electing a University President Using
Open-Audit Voting: Analysis of Real-World Use of
Helios. In D. Jefferson, J.L. Hall, T. M., editor,
Electronic Voting Technology Workshop/Workshop on
Trustworthy Elections. Usenix.
Belenios (2018a). Belenios election server. https://belenios.
loria.fr/admin.
Belenios (2018b). Belenios verifiable online voting system.
http://www.belenios.org/.
Benaloh, J., Bernhard, M., Halderman, J. A., Rivest, R. L.,
Ryan, P. Y. A., Stark, P. B., Teague, V., Vora, P. L., and
Wallach, D. S. (2017). Public evidence from secret
ballots. CoRR, abs/1707.08619.
Bringer, J., Chabanne, H., Kevenaar, T. A. M., and Kindarji,
B. (2009). Extending match-on-card to local biomet-
ric identification. In Biometric ID Management and
Multimodal Communication, Joint COST 2101 and
2102 International Conference, BioID MultiComm,
pages 178–186.
Budurushi, J., Neumann, S., and Volkamer, M. (2012).
Smart cards in electronic voting: Lessons learned
from applications in legally-binding elections and ap-
proaches proposed in scientific papers. In EVOTE
2012, pages 257–270.
Chaidos, P., Cortier, V., Fuchsbauer, G., and Galindo, D.
(2016a). BeleniosRF: A Non-interactive Receipt-Free
Electronic Voting Scheme. In Proceedings of the 2016
ACM SIGSAC, pages 1614–1625.
Chaidos, P., Cortier, V., Fuchsbauer, G., and Galindo, D.
(2016b). BeleniosRF: A Non-Interactive Receipt-Free
Electronic Voting Scheme. Presentation at CCS 2016.
https://www.youtube.com/watch?v=Fzj29WTVWb8.
Clarkson, M. R., Chong, S., and Myers, A. C. (2008). Civ-
itas: Toward a secure voting system. In IEEE Sympo-
sium on Security and Privacy, pages 354–368.
Common Criteria (2018). ICs, Smart Cards and Smart
Card-Related Devices and Systems , Certified Prod-
ucts. https://www.commoncriteriaportal.org/products/
#IC.
Cortier, V., Dragan, C. C., Strub, P.-Y., Dupressoir, F., and
Warinschi, B. (2018). Machine-checked proofs for
electronic voting: privacy and verifiability for belenio.
In Proceedings of the 31st IEEE Computer Security
Foundations Symposium (CSF’18). To appear.
Cortier, V., Galindo, D., Glondu, S., and Izabach
`
ene, M.
(2014). Election Verifiability for Helios under Weaker
Trust Assumptions. In Computer Security - ESORICS
- Proceedings, Part II, pages 327–344.
Estonia (2018). E-Estonia. https://e-estonia.com/solutions/
e-governance/i-voting/.
Gamal, T. E. (1984). A public key cryptosystem and a sig-
nature scheme based on discrete logarithms. In Ad-
vances in Cryptology - CRYPTO ’84, pages 10–18.
Glondu, S. (2018). Belenios specification. version 1.5.
https://gforge.inria.fr/projects/belenios/.
Hao, F., Daugman, J., and Zielinski, P. (2008). A fast search
algorithm for a large fuzzy database. IEEE Trans. In-
formation Forensics and Security, 3(2):203–212.
Huang, G. B., Mattar, M., Berg, T., and Learned-Miller,
E. (2008). Labeled Faces in the Wild: A Database
forStudying Face Recognition in Unconstrained Envi-
ronments. In Workshop on Faces in ’Real-Life’ Im-
ages: Detection, Alignment, and Recognition. Erik
Learned-Miller and Andras Ferencz and Fr
´
ed
´
eric Ju-
rie.
Lee, B. and Kim, K. (2002). Receipt-free electronic vot-
ing scheme with a tamper-resistant randomizer. In In-
formation Security and Cryptology - ICISC 2002, Re-
vised Papers, pages 389–406.
Magkos, E., Burmester, M., and Chrissikopoulos, V. (2001).
Receipt-freeness in large-scale elections without un-
tappable channels. In Towards The E-Society: E-
Commerce, E-Business, and E-Government, The First
Smart-card Deployment of an Electronic Voting Protocol
509