electronic voting domain is slow to adapt with a relatively low number of ... In our work, we investigate a new decentralized, anonymous payment scheme called ...
... to reveal new votes. Clear logs. âCalling cardâ ... App. Voting. Client. Encrypt(Pk elect. ,(Pad r. (âPaul Pol
Steal database passwords, keys, etc. Replace all existing votes with ours. Replace any new votes. Back door to reveal ne
can give legally binding digital signatures and authenticate themselves in electronic environments. The software, protoc
Estonia was the first country in the world to introduce Internet Voting pan- nationally in ... Constitutional Review Chamber of the Supreme Court of Estonia.
May 18, 2013 - We employ the blind signature technique and the dynamic ballots instead of complex cryptographic techniques to preserve privacy in electronic ...
Hence, coercion/vote buying issue has become one of i-voting system ..... to act as a secure personal computer or secure customized Web server on the client ... key management, and secure hosting for Web application. [41,42]. Furthermore ...
Trojans , ransom ware , spyware , adware , scareware and other malicious programs. It can take executable code, scripts, active content, and other forms of.
2) The ballot paper and the ballot marker pen are not tampered with and perform ..... For the first pilot1, only Android OS 2.2 and higher were supported as the ...
Aug 31, 2011 - If an Internet banking service is unavailable, clients can simply try again ...... http://thevotingnews.c
Voting via the Internet is part of electronic government and electronic democracy. ... oriented security aspects due to democratic basic principles in order to execute legally accepted online polls. .... voting terminals with special signature cards.
person or organization could buy or force a voter to vote for specific voting options. The voting channel must prevent a voter from proving to a third party in.
We present a voter verifiable Internet voting scheme which provides anonymity and ... there, and this may cost time and money, and in some cases prohibit the voter to ..... To each pair, BGS attaches two encrypted marks, the first mark is either ...
Aug 31, 2011 - Email: [email protected]. Website: ..... code printed on a voting card sent to them by post. ..
Virtual Private Network (VPN) for transmitting data from the voting kiosks to the .... the localities or their vendors (
Aug 31, 2011 - are actually encryption around the voter's identification and vote. ..... Retrieved from: http://www.ekos
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Web Site: ... article shows how government project digital India performs major role to .... Growth http://blogs.forrester.com/jitender_miglani/14-08-06.
phones (such as the secure and versatile iPhone) and tablets. (such as the ... In [6] the authors analyzed a DRE system that the. State of ..... shares given, it is easy to see that s5 = 8172. It is easy ..... Electronic voting machines versus tradit
unique vote identifier (the vote's serial number) and the control code (actually the digital signature of the vote ident
participation, Internet voting seems poised to increase inequalities, rather than level them, but it could help those vo
Nov 6, 2012 - Social media is a significant part of the process by which voters are talking about ... 10%. 20%. 30%. 40%. 50%. Have been encouraged to vote ... from family and friends via postings on social networking sites (SNS) or Twitter.
Apr 2, 2014 - 2011 aimed at proving that Internet voting is a viable ... placed, and there was no longer an option to vote by SMS. ... worst nightmare. Barbara ...
data in three steps: First, I will undertake an analysis of the aggregated data, to see if ..... elections in 2007 (a pr
up a project team which included one of the co-authors of the TNO report, Piet ... If the vote is valid, its hash value can be found in the pre-election table and the ...
Auditing â Counting Votes. Page 38. The Future o Ethereum o Zk-SNARK extension o Zcash over Ethereum (ZOE). Page 39. 146.47%?. How many times did ...
Internet Voting Using Zcash Pavel Tarasov
Why? o Cheaper voting alternative o Most voting protocols are complicated o Get more young people to vote o Blockchain offers inherent security and requires new approach
Why?
= 146.47%?
A little bit about Blockchains o Decentralised o Immutable o Connected together by blocks o Every participant has a copy
o Zero Coins (ZEC) as currency o 2 address types oAnonymous transactions oPublic transactions
o Zero Knowledge Proving System
Bitcoin At A Glance
Zcash At A Glance
ZEC – Zero Coin o Can be shielded or transparent, depending on the address used. o Consists of a tuple (𝑎𝑝𝑘 , 𝑣, 𝜌, 𝑟) o 𝑎𝑝 𝑘 − paying key of the recipient o 𝑣 – value of the ZEC o 𝜌 – value used to derive the nullifier o 𝑟 – value used for the commitment trapdoor
Zcash Addresses o 2 Types: o 𝑡 − addresses o 𝑧 − addresses
Zcash Addresses o 2 Types: o 𝑡 − addresses o 𝑧 − addresses
o 𝑡 − addresses o Used for public transactions o Don’t hide transaction details o Exactly like Bitcoin address
Zcash Addresses o 2 Types: o 𝑡 − addresses o 𝑧 − addresses
o o o o
o 𝑧 − addresses o Used for shielded transactions o Completely private transactions
Zcash Addresses cont. o Combination of keys used at different stages
Zcash Transactions o Allows transparent and private transactions
o Private part holds shielded ZEC
o Transparent part holds public ZEC
Adapted from z.cash
ZEC ciphertext o Secret random values used to generated ZEC o Must be passed on when sending ZEC o Has the form 𝒗, 𝝆, 𝒓, 𝒎𝒆𝒎𝒐 where: o 𝒗 – the value of the ZEC o 𝝆 – value used to derive the nullifier o 𝒓 – value used for the commitment trapdoor o 𝒎𝒆𝒎𝒐– value used in agreement between sender and receiver
Zero Knowledge Problem Statement How can I prove to you that I know a secret value that satisfies a particular function? zk-SNARK o Zero Knowledge Succinct Non-interactive Arguments of Knowledge o Generate a proof given a program
zk-SNARKs
zk-SNARKs Given a program and a secret value - generate 2 keys
zk-SNARKs Given a program and a secret value - generate 2 keys
Create Proof based on a public value, proving key and secret value
zk-SNARKs Given a program and a secret value - generate 2 keys
Create Proof based on a public value, proving key and secret value Verify proof from prover given verification key, proof and public value
zk-SNARK in Zcash o Brings the above together o Proves that: 1.
Total Input values = total output values in transaction
2. Prover knew spending key of the input ZEC 3. The nullifier and commitment have been calculated correctly
o And more…
Voting System Steps 1. Registration 2. Invitation
3.
Voting
4.
Tally/Audit
Voting System Overview Registration
Invitation
Voting
The Tally
Voter Registration
Poll invitation
Voting
Implementation Variants o Variant 1 - Voter sends vote to candidate’s t address: o Preserved linkability of every coin o Transactions are completely transparent o Candidate vote balances can be seen at all times
Implementation Variants o o o
o Variant 2 - Voter sends vote to candidate’s z address: o Involves key establishment
o Transaction is private and cannot be seen by anyone except the parties involved o Audit of the votes is not completely transparent
Auditing – Counting Votes
The Future o Ethereum o Zk-SNARK extension o Zcash over Ethereum (ZOE)