Home > Research > Publications & Outputs > Auditing for privacy in threshold PKE e-voting

Electronic data

  • main_journal_mitm_helios

    Rights statement: This article is (c)2017 Emerald Group Publishing and permission has been granted for this version to appear here. Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.

    Accepted author manuscript, 421 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Auditing for privacy in threshold PKE e-voting

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Auditing for privacy in threshold PKE e-voting. / Kiayias, Aggelos; Zacharias, Thomas; Zhang, Bingsheng.
In: Information and Computer Security, Vol. 25, No. 1, 01.03.2017, p. 100-116.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Kiayias, A, Zacharias, T & Zhang, B 2017, 'Auditing for privacy in threshold PKE e-voting', Information and Computer Security, vol. 25, no. 1, pp. 100-116. https://doi.org/10.1108/ICS-07-2016-0056

APA

Kiayias, A., Zacharias, T., & Zhang, B. (2017). Auditing for privacy in threshold PKE e-voting. Information and Computer Security, 25(1), 100-116. https://doi.org/10.1108/ICS-07-2016-0056

Vancouver

Kiayias A, Zacharias T, Zhang B. Auditing for privacy in threshold PKE e-voting. Information and Computer Security. 2017 Mar 1;25(1):100-116. doi: 10.1108/ICS-07-2016-0056

Author

Kiayias, Aggelos ; Zacharias, Thomas ; Zhang, Bingsheng. / Auditing for privacy in threshold PKE e-voting. In: Information and Computer Security. 2017 ; Vol. 25, No. 1. pp. 100-116.

Bibtex

@article{ce5a5a3479dc4340910211272162863e,
title = "Auditing for privacy in threshold PKE e-voting",
abstract = "Purpose This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply threshold public key encryption (TPKE) in the client such as Helios and use a bulletin board (BB). Design/methodology/approach Argumentation builds upon a formal description of a typical TPKE-based e-voting system where the election authority (EA) is the central node in a star network topology. The paper points out the weaknesses of the said topology with respect to privacy and analyzes how these weaknesses affect the security of several instances of TPKE-based e-voting systems. Overall, it studies the importance of auditing from a privacy aspect. Findings The paper shows that without public key infrastructure (PKI) support or ? more generally ? authenticated BB ?append? operations, TPKE-based e-voting systems are vulnerable to attacks where the malicious EA can act as a man-in-the-middle between the election trustees and the voters; hence, it can learn how the voters have voted. As a countermeasure for such attacks, this work suggests compulsory trustee auditing. Furthermore, it analyzes how lack of cryptographic proof verification affects the level of privacy that can be provably guaranteed in a typical TPKE e-voting system. Originality/value As opposed to the extensively studied importance of auditing to ensure election integrity, the necessity of auditing to protect privacy in an e-voting system has been mostly overlooked. This paper reveals design weaknesses present in noticeable TPKE-based e-voting systems that can lead to a total breach of voters? privacy and shows how auditing can be applied for providing strong provable privacy guarantees.",
keywords = "Privacy, Auditing, E-Voting, Helios, Man-in-the-middle",
author = "Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang",
note = "This article is (c)2017 Emerald Group Publishing and permission has been granted for this version to appear here. Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.",
year = "2017",
month = mar,
day = "1",
doi = "10.1108/ICS-07-2016-0056",
language = "English",
volume = "25",
pages = "100--116",
journal = "Information and Computer Security",
issn = "2056-4961",
publisher = "Emerald",
number = "1",

}

RIS

TY - JOUR

T1 - Auditing for privacy in threshold PKE e-voting

AU - Kiayias, Aggelos

AU - Zacharias, Thomas

AU - Zhang, Bingsheng

N1 - This article is (c)2017 Emerald Group Publishing and permission has been granted for this version to appear here. Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.

PY - 2017/3/1

Y1 - 2017/3/1

N2 - Purpose This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply threshold public key encryption (TPKE) in the client such as Helios and use a bulletin board (BB). Design/methodology/approach Argumentation builds upon a formal description of a typical TPKE-based e-voting system where the election authority (EA) is the central node in a star network topology. The paper points out the weaknesses of the said topology with respect to privacy and analyzes how these weaknesses affect the security of several instances of TPKE-based e-voting systems. Overall, it studies the importance of auditing from a privacy aspect. Findings The paper shows that without public key infrastructure (PKI) support or ? more generally ? authenticated BB ?append? operations, TPKE-based e-voting systems are vulnerable to attacks where the malicious EA can act as a man-in-the-middle between the election trustees and the voters; hence, it can learn how the voters have voted. As a countermeasure for such attacks, this work suggests compulsory trustee auditing. Furthermore, it analyzes how lack of cryptographic proof verification affects the level of privacy that can be provably guaranteed in a typical TPKE e-voting system. Originality/value As opposed to the extensively studied importance of auditing to ensure election integrity, the necessity of auditing to protect privacy in an e-voting system has been mostly overlooked. This paper reveals design weaknesses present in noticeable TPKE-based e-voting systems that can lead to a total breach of voters? privacy and shows how auditing can be applied for providing strong provable privacy guarantees.

AB - Purpose This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply threshold public key encryption (TPKE) in the client such as Helios and use a bulletin board (BB). Design/methodology/approach Argumentation builds upon a formal description of a typical TPKE-based e-voting system where the election authority (EA) is the central node in a star network topology. The paper points out the weaknesses of the said topology with respect to privacy and analyzes how these weaknesses affect the security of several instances of TPKE-based e-voting systems. Overall, it studies the importance of auditing from a privacy aspect. Findings The paper shows that without public key infrastructure (PKI) support or ? more generally ? authenticated BB ?append? operations, TPKE-based e-voting systems are vulnerable to attacks where the malicious EA can act as a man-in-the-middle between the election trustees and the voters; hence, it can learn how the voters have voted. As a countermeasure for such attacks, this work suggests compulsory trustee auditing. Furthermore, it analyzes how lack of cryptographic proof verification affects the level of privacy that can be provably guaranteed in a typical TPKE e-voting system. Originality/value As opposed to the extensively studied importance of auditing to ensure election integrity, the necessity of auditing to protect privacy in an e-voting system has been mostly overlooked. This paper reveals design weaknesses present in noticeable TPKE-based e-voting systems that can lead to a total breach of voters? privacy and shows how auditing can be applied for providing strong provable privacy guarantees.

KW - Privacy

KW - Auditing

KW - E-Voting

KW - Helios

KW - Man-in-the-middle

U2 - 10.1108/ICS-07-2016-0056

DO - 10.1108/ICS-07-2016-0056

M3 - Journal article

VL - 25

SP - 100

EP - 116

JO - Information and Computer Security

JF - Information and Computer Security

SN - 2056-4961

IS - 1

ER -