Voting: You Can't Have Privacy without Individual Verifiability
Véronique Cortier and Joseph Lallemand. Voting: You Can't Have Privacy without Individual Verifiability. In 25th ACM Conference on Computer and Communications Security (CCS'18), pp. 53–66, ACM, 2018.
doi:10.1145/3243734.3243762
Download
Abstract
Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability (anyone can check that the result corresponds to the published ballots); and eligibility verifiability (only legitimate voters may vote).
We show that actually, privacy implies individual verifiability. In other words, systems without individual verifiability cannot achieve privacy (under the same trust assumptions). To demonstrate the generality of our result, we show this implication in two different settings, namely cryptographic and symbolic models, for standard notions of privacy and individual verifiability. Our findings also highlight limitations in existing privacy definitions in cryptographic settings.
BibTeX
@InProceedings{CL-CCS18, author = {V\'eronique Cortier and Joseph Lallemand}, title = {Voting: You Can't Have Privacy without Individual Verifiability}, booktitle = {25th ACM Conference on Computer and Communications Security (CCS'18)}, year = 2018, abstract = {Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability (anyone can check that the result corresponds to the published ballots); and eligibility verifiability (only legitimate voters may vote). \par We show that actually, privacy implies individual verifiability. In other words, systems without individual verifiability cannot achieve privacy (under the same trust assumptions). To demonstrate the generality of our result, we show this implication in two different settings, namely cryptographic and symbolic models, for standard notions of privacy and individual verifiability. Our findings also highlight limitations in existing privacy definitions in cryptographic settings. }, pages = {53--66}, publisher = {ACM}, doi = {10.1145/3243734.3243762}, ={https://members.loria.fr/VCortier/files/Papers/CCS2018.pdf}, }