ABSTRACT

CONTENTS 13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 13.2 Dining Cryptographers Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

13.2.1 Description of the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 13.2.2 Chaum’s Original Solution: DC-net . . . . . . . . . . . . . . . . . . . . . . . . 345 13.2.3 Limitations of DC-net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 13.2.4 First Attempt on a New Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 13.2.5 Improved Solution: AV-net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 13.2.6 Presentation at SPW 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

13.3 Boardroom Electronic Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 13.3.1 Open Vote Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 13.3.2 Extension to Multi-Candidate Election . . . . . . . . . . . . . . . . . . . . . 353 13.3.3 Presentation at WISSec 2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

13.4 Large-Scale Electronic Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.1 From Decentralized to Centralized . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.2 Trade-off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.3 Direct Recording Electronic with Integrity . . . . . . . . . . . . . . . . . 357

13.4.3.1 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

. . . . . . . . . . . . . . . . . 13.4.3.3 Tallying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

13.4.4 Publication of the DRE-i Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 13.5 Trial Elections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362

13.5.1 Prototyping DRE-i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 13.5.2 Favorite Chocolate Election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 13.5.3 Favorite Cheese Election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 13.5.4 ERC Starting Grant on Self-Enforcing E-Voting . . . . . . . . . . . . 367 13.5.5 A Verifiable Classroom Voting System . . . . . . . . . . . . . . . . . . . . . 368 13.5.6 Cryptography Meeting Pedagogy . . . . . . . . . . . . . . . . . . . . . . . . . . 371

13.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374

13.1 Introduction In this chapter, I will describe a journey of exploring a verifiable e-voting system that can be deployed in practice. This journey started in 2005 when I was a second-year PhD student working under the supervision of Ross Anderson in the security group, Computer Laboratory, University of Cambridge. The liberal research environment in the Computer Lab encouraged PhD students to freely explore topics of their interest, not necessarily confined by their original PhD proposal. While working on “biometric encryption” (which was my original PhD topic), I became interested in cryptography and wanted to learn more in this field.