Home > Research > Publications & Outputs > DEMOS-2

Electronic data

  • demos2

    Rights statement: © ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security http://dx.doi.org/10.1145/2810103.2813727

    Accepted author manuscript, 461 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

DEMOS-2: scalable E2E verifiable elections without random oracles

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

DEMOS-2: scalable E2E verifiable elections without random oracles. / Kiayias, Aggelos; Zacharias, Thomas; Zhang, Bingsheng.
CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015. p. 352-363.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Kiayias, A, Zacharias, T & Zhang, B 2015, DEMOS-2: scalable E2E verifiable elections without random oracles. in CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 352-363, the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, United States, 6/10/15. https://doi.org/10.1145/2810103.2813727

APA

Kiayias, A., Zacharias, T., & Zhang, B. (2015). DEMOS-2: scalable E2E verifiable elections without random oracles. In CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 352-363). ACM. https://doi.org/10.1145/2810103.2813727

Vancouver

Kiayias A, Zacharias T, Zhang B. DEMOS-2: scalable E2E verifiable elections without random oracles. In CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2015. p. 352-363 doi: 10.1145/2810103.2813727

Author

Kiayias, Aggelos ; Zacharias, Thomas ; Zhang, Bingsheng. / DEMOS-2 : scalable E2E verifiable elections without random oracles. CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2015. pp. 352-363

Bibtex

@inproceedings{e5838b2c403948ab8262f1c377c7e89f,
title = "DEMOS-2: scalable E2E verifiable elections without random oracles",
abstract = "Recently, Kiayias, Zacharias and Zhang-proposed a new E2E verifiable e-voting system called 'DEMOS' that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, DEMOS comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to {\em precompute} a number of ciphertexts for each voter and each possible choice of the voter. This approach clearly does not scale to elections that have a complex ballot and voters have an exponential number of ways to vote in the number of candidates. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext.In contrast to the above, in this work, we construct a new e-voting system that retains the strong E2E characteristics of DEMOS (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. We achieve this via a new cryptographic construction that has the EA produce and prove, using voters' coins, the security of a common reference string (CRS) that voters subsequently can use to affix non-interactive zero-knowledge (NIZK) proofs to their ciphertexts. The EA itself uses the CRS to prove via a NIZK the tally correctness at the end. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.",
keywords = "e-voting, elections, verifiable",
author = "Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang",
note = "{\textcopyright} ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security http://dx.doi.org/10.1145/2810103.2813727; the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 ; Conference date: 06-10-2015 Through 12-10-2015",
year = "2015",
month = oct,
day = "12",
doi = "10.1145/2810103.2813727",
language = "English",
isbn = "9781450338325",
pages = "352--363",
booktitle = "CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",

}

RIS

TY - GEN

T1 - DEMOS-2

T2 - the 22nd ACM SIGSAC Conference on Computer and Communications Security

AU - Kiayias, Aggelos

AU - Zacharias, Thomas

AU - Zhang, Bingsheng

N1 - © ACM, 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security http://dx.doi.org/10.1145/2810103.2813727

PY - 2015/10/12

Y1 - 2015/10/12

N2 - Recently, Kiayias, Zacharias and Zhang-proposed a new E2E verifiable e-voting system called 'DEMOS' that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, DEMOS comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to {\em precompute} a number of ciphertexts for each voter and each possible choice of the voter. This approach clearly does not scale to elections that have a complex ballot and voters have an exponential number of ways to vote in the number of candidates. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext.In contrast to the above, in this work, we construct a new e-voting system that retains the strong E2E characteristics of DEMOS (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. We achieve this via a new cryptographic construction that has the EA produce and prove, using voters' coins, the security of a common reference string (CRS) that voters subsequently can use to affix non-interactive zero-knowledge (NIZK) proofs to their ciphertexts. The EA itself uses the CRS to prove via a NIZK the tally correctness at the end. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.

AB - Recently, Kiayias, Zacharias and Zhang-proposed a new E2E verifiable e-voting system called 'DEMOS' that for the first time provides E2E verifiability without relying on external sources of randomness or the random oracle model; the main advantage of such system is in the fact that election auditors need only the election transcript and the feedback from the voters to pronounce the election process unequivocally valid. Unfortunately, DEMOS comes with a huge performance and storage penalty for the election authority (EA) compared to other e-voting systems such as Helios. The main reason is that due to the way the EA forms the proof of the tally result, it is required to {\em precompute} a number of ciphertexts for each voter and each possible choice of the voter. This approach clearly does not scale to elections that have a complex ballot and voters have an exponential number of ways to vote in the number of candidates. The performance penalty on the EA appears to be intrinsic to the approach: voters cannot compute an enciphered ballot themselves because there seems to be no way for them to prove that it is a valid ciphertext.In contrast to the above, in this work, we construct a new e-voting system that retains the strong E2E characteristics of DEMOS (but against computational adversaries) while completely eliminating the performance and storage penalty of the EA. We achieve this via a new cryptographic construction that has the EA produce and prove, using voters' coins, the security of a common reference string (CRS) that voters subsequently can use to affix non-interactive zero-knowledge (NIZK) proofs to their ciphertexts. The EA itself uses the CRS to prove via a NIZK the tally correctness at the end. Our construction has similar performance to Helios and is practical. The privacy of our construction relies on the SXDH assumption over bilinear groups via complexity leveraging.

KW - e-voting

KW - elections

KW - verifiable

U2 - 10.1145/2810103.2813727

DO - 10.1145/2810103.2813727

M3 - Conference contribution/Paper

SN - 9781450338325

SP - 352

EP - 363

BT - CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

Y2 - 6 October 2015 through 12 October 2015

ER -