Voting: You Can't Have Privacy without Individual Verifiability
Véronique Cortier and Joseph Lallemand. Voting: You Can't Have Privacy without Individual Verifiability. In 25th ACM Conference on Computer and Communications Security (CCS'18), pp. 53–66, ACM, 2018.
doi:10.1145/3243734.3243762
Download
Abstract
Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability (anyone can check that the result corresponds to the published ballots); and eligibility verifiability (only legitimate voters may vote).
We show that actually, privacy implies individual verifiability. In other words, systems without individual verifiability cannot achieve privacy (under the same trust assumptions). To demonstrate the generality of our result, we show this implication in two different settings, namely cryptographic and symbolic models, for standard notions of privacy and individual verifiability. Our findings also highlight limitations in existing privacy definitions in cryptographic settings.
BibTeX
@InProceedings{CL-CCS18,
author = {V\'eronique Cortier and Joseph Lallemand},
title = {Voting: You Can't Have Privacy without Individual
Verifiability},
booktitle = {25th ACM Conference on Computer and Communications
Security (CCS'18)},
year = 2018,
abstract = {Electronic voting typically aims at two main
security goals: vote privacy and
verifiability. These two goals are often seen as
antagonistic and some national agencies even impose
a hierarchy between them: first privacy, and then
verifiability as an additional feature.
Verifiability typically includes individual
verifiability (a voter can check that her ballot is
counted); universal verifiability (anyone can check
that the result corresponds to the published
ballots); and eligibility verifiability (only
legitimate voters may vote). \par We show that
actually, privacy implies individual
verifiability. In other words, systems without
individual verifiability cannot achieve privacy
(under the same trust assumptions). To demonstrate
the generality of our result, we show this
implication in two different settings, namely
cryptographic and symbolic models, for standard
notions of privacy and individual verifiability.
Our findings also highlight limitations in existing
privacy definitions in cryptographic settings. },
pages = {53--66},
publisher = {ACM},
doi = {10.1145/3243734.3243762},
={https://members.loria.fr/VCortier/files/Papers/CCS2018.pdf},
}