Lecture 8
Lecture 8 Electronic Elections and Auctions
.
Outline
.
Elections
.
Four Phases to Any Election Protocol
.
Opportunities for Corruption
.
Preventing Election Fraud
.
The Challenge for Secure Electronic Voting
.
Motivation
.
Desired Properties
.
Desired Properties ( cont'd )
.
Desired Properties ( cont'd )
.
A Simple (Non- Crypto ) Protocol
.
Good and Bad
.
Two Fixes Using Crypto
.
Problem and Solution (?)
.
Good and Bad
.
Two Agency Protocol [ Salomaa 91]
.
Good and Bad
.
One Agency Protocol [ Nurmi , Salomaa , and Santean 91]
.
More on ANDOS
.
Solving the Collusion Problem Differently
.
Fujioka, Okamoto , and Ohta '93
.
Both Two- and One-Agency Protocols Still Have a Couple of Problems
.
Receipt-Free Elections [ Benaloh '94]
.
Building Blocks
.
General Idea
.
Vote-Casting Protocol
.
Tallying and Publishing the Results
.
Protocol Properties
.
What's that x ?
.
Homework Extra Credit
.
Decentralized Voting
.
Merritt '83
.
Verification Step
.
Tallying
.
Protocol Properties
.
Benaloh '87: Building Blocks
.
Secret Sharing Homomorphisms
.
Generalization
.
Example with Two Subsecrets
.
Real Example
.
Application to Elections
.
Cont'd
.
Other applications
.
Electronic Auctions
.
Model of Auctions
.
Problems with On-Line Auctions
.
Sealed-Bid Auction
.
Sealed Bid Auctions
.
Untrustworthy Auctioneer or Insider Cheating
.
Abadi and Needham (Principles) Attack
.
Franklin and Reiter '96 Protocol
.
: Building Blocks
.
Scaffolding of Protocols
.
Secret Sharing of Bids
.
Off-line Digital Cash for Creating Bids
.
Verifiable Signature Sharing
.
Verifiable Signature Sharing
.
What Does VES Buy You?
.
Final Remarks
.
Next lecture and Readings
.
Back to
Lectures
Heather L. Marko
Last Modified: November 1998