ABSTRACT
CONTENTS 13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 13.2 Dining Cryptographers Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
13.2.1 Description of the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 13.2.2 Chaum’s Original Solution: DC-net . . . . . . . . . . . . . . . . . . . . . . . . 345 13.2.3 Limitations of DC-net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 13.2.4 First Attempt on a New Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 13.2.5 Improved Solution: AV-net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 13.2.6 Presentation at SPW 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
13.3 Boardroom Electronic Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 13.3.1 Open Vote Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 13.3.2 Extension to Multi-Candidate Election . . . . . . . . . . . . . . . . . . . . . 353 13.3.3 Presentation at WISSec 2009 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
13.4 Large-Scale Electronic Voting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.1 From Decentralized to Centralized . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.2 Trade-off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 13.4.3 Direct Recording Electronic with Integrity . . . . . . . . . . . . . . . . . 357
13.4.3.1 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
. . . . . . . . . . . . . . . . . 13.4.3.3 Tallying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
13.4.4 Publication of the DRE-i Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 13.5 Trial Elections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
13.5.1 Prototyping DRE-i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 13.5.2 Favorite Chocolate Election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 13.5.3 Favorite Cheese Election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 13.5.4 ERC Starting Grant on Self-Enforcing E-Voting . . . . . . . . . . . . 367 13.5.5 A Verifiable Classroom Voting System . . . . . . . . . . . . . . . . . . . . . 368 13.5.6 Cryptography Meeting Pedagogy . . . . . . . . . . . . . . . . . . . . . . . . . . 371
13.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
13.1 Introduction In this chapter, I will describe a journey of exploring a verifiable e-voting system that can be deployed in practice. This journey started in 2005 when I was a second-year PhD student working under the supervision of Ross Anderson in the security group, Computer Laboratory, University of Cambridge. The liberal research environment in the Computer Lab encouraged PhD students to freely explore topics of their interest, not necessarily confined by their original PhD proposal. While working on “biometric encryption” (which was my original PhD topic), I became interested in cryptography and wanted to learn more in this field.