A generalization of Paillier’s public-key system with applications to electronic voting
Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is...
Ausführliche Beschreibung
Autor*in: |
Damgård, Ivan [verfasserIn] Jurik, Mads [verfasserIn] Nielsen, Jesper Buus [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2010 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: International Journal of Information Security - Springer-Verlag, 2001, 9(2010), 6 vom: 30. Sept., Seite 371-385 |
---|---|
Übergeordnetes Werk: |
volume:9 ; year:2010 ; number:6 ; day:30 ; month:09 ; pages:371-385 |
Links: |
---|
DOI / URN: |
10.1007/s10207-010-0119-9 |
---|
Katalog-ID: |
SPR009129405 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR009129405 | ||
003 | DE-627 | ||
005 | 20201124063515.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201005s2010 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10207-010-0119-9 |2 doi | |
035 | |a (DE-627)SPR009129405 | ||
035 | |a (SPR)s10207-010-0119-9-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Damgård, Ivan |e verfasserin |4 aut | |
245 | 1 | 2 | |a A generalization of Paillier’s public-key system with applications to electronic voting |
264 | 1 | |c 2010 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. | ||
650 | 4 | |a Public-key encryption |7 (dpeaa)DE-He213 | |
650 | 4 | |a Electronic voting |7 (dpeaa)DE-He213 | |
650 | 4 | |a Homomorphic encryption |7 (dpeaa)DE-He213 | |
650 | 4 | |a Zero-knowledge |7 (dpeaa)DE-He213 | |
700 | 1 | |a Jurik, Mads |e verfasserin |4 aut | |
700 | 1 | |a Nielsen, Jesper Buus |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International Journal of Information Security |d Springer-Verlag, 2001 |g 9(2010), 6 vom: 30. Sept., Seite 371-385 |w (DE-627)SPR009127291 |7 nnns |
773 | 1 | 8 | |g volume:9 |g year:2010 |g number:6 |g day:30 |g month:09 |g pages:371-385 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s10207-010-0119-9 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
951 | |a AR | ||
952 | |d 9 |j 2010 |e 6 |b 30 |c 09 |h 371-385 |
author_variant |
i d id m j mj j b n jb jbn |
---|---|
matchkey_str |
damgrdivanjurikmadsnielsenjesperbuus:2010----:gnrlztoopilesulcessewtapiai |
hierarchy_sort_str |
2010 |
publishDate |
2010 |
allfields |
10.1007/s10207-010-0119-9 doi (DE-627)SPR009129405 (SPR)s10207-010-0119-9-e DE-627 ger DE-627 rakwb eng Damgård, Ivan verfasserin aut A generalization of Paillier’s public-key system with applications to electronic voting 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 Jurik, Mads verfasserin aut Nielsen, Jesper Buus verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 9(2010), 6 vom: 30. Sept., Seite 371-385 (DE-627)SPR009127291 nnns volume:9 year:2010 number:6 day:30 month:09 pages:371-385 https://dx.doi.org/10.1007/s10207-010-0119-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 9 2010 6 30 09 371-385 |
spelling |
10.1007/s10207-010-0119-9 doi (DE-627)SPR009129405 (SPR)s10207-010-0119-9-e DE-627 ger DE-627 rakwb eng Damgård, Ivan verfasserin aut A generalization of Paillier’s public-key system with applications to electronic voting 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 Jurik, Mads verfasserin aut Nielsen, Jesper Buus verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 9(2010), 6 vom: 30. Sept., Seite 371-385 (DE-627)SPR009127291 nnns volume:9 year:2010 number:6 day:30 month:09 pages:371-385 https://dx.doi.org/10.1007/s10207-010-0119-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 9 2010 6 30 09 371-385 |
allfields_unstemmed |
10.1007/s10207-010-0119-9 doi (DE-627)SPR009129405 (SPR)s10207-010-0119-9-e DE-627 ger DE-627 rakwb eng Damgård, Ivan verfasserin aut A generalization of Paillier’s public-key system with applications to electronic voting 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 Jurik, Mads verfasserin aut Nielsen, Jesper Buus verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 9(2010), 6 vom: 30. Sept., Seite 371-385 (DE-627)SPR009127291 nnns volume:9 year:2010 number:6 day:30 month:09 pages:371-385 https://dx.doi.org/10.1007/s10207-010-0119-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 9 2010 6 30 09 371-385 |
allfieldsGer |
10.1007/s10207-010-0119-9 doi (DE-627)SPR009129405 (SPR)s10207-010-0119-9-e DE-627 ger DE-627 rakwb eng Damgård, Ivan verfasserin aut A generalization of Paillier’s public-key system with applications to electronic voting 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 Jurik, Mads verfasserin aut Nielsen, Jesper Buus verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 9(2010), 6 vom: 30. Sept., Seite 371-385 (DE-627)SPR009127291 nnns volume:9 year:2010 number:6 day:30 month:09 pages:371-385 https://dx.doi.org/10.1007/s10207-010-0119-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 9 2010 6 30 09 371-385 |
allfieldsSound |
10.1007/s10207-010-0119-9 doi (DE-627)SPR009129405 (SPR)s10207-010-0119-9-e DE-627 ger DE-627 rakwb eng Damgård, Ivan verfasserin aut A generalization of Paillier’s public-key system with applications to electronic voting 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 Jurik, Mads verfasserin aut Nielsen, Jesper Buus verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 9(2010), 6 vom: 30. Sept., Seite 371-385 (DE-627)SPR009127291 nnns volume:9 year:2010 number:6 day:30 month:09 pages:371-385 https://dx.doi.org/10.1007/s10207-010-0119-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 9 2010 6 30 09 371-385 |
language |
English |
source |
Enthalten in International Journal of Information Security 9(2010), 6 vom: 30. Sept., Seite 371-385 volume:9 year:2010 number:6 day:30 month:09 pages:371-385 |
sourceStr |
Enthalten in International Journal of Information Security 9(2010), 6 vom: 30. Sept., Seite 371-385 volume:9 year:2010 number:6 day:30 month:09 pages:371-385 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Public-key encryption Electronic voting Homomorphic encryption Zero-knowledge |
isfreeaccess_bool |
false |
container_title |
International Journal of Information Security |
authorswithroles_txt_mv |
Damgård, Ivan @@aut@@ Jurik, Mads @@aut@@ Nielsen, Jesper Buus @@aut@@ |
publishDateDaySort_date |
2010-09-30T00:00:00Z |
hierarchy_top_id |
SPR009127291 |
id |
SPR009129405 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR009129405</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063515.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-010-0119-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR009129405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-010-0119-9-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Damgård, Ivan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A generalization of Paillier’s public-key system with applications to electronic voting</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public-key encryption</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic voting</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Homomorphic encryption</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Zero-knowledge</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jurik, Mads</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nielsen, Jesper Buus</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">9(2010), 6 vom: 30. Sept., Seite 371-385</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:6</subfield><subfield code="g">day:30</subfield><subfield code="g">month:09</subfield><subfield code="g">pages:371-385</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-010-0119-9</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2010</subfield><subfield code="e">6</subfield><subfield code="b">30</subfield><subfield code="c">09</subfield><subfield code="h">371-385</subfield></datafield></record></collection>
|
author |
Damgård, Ivan |
spellingShingle |
Damgård, Ivan misc Public-key encryption misc Electronic voting misc Homomorphic encryption misc Zero-knowledge A generalization of Paillier’s public-key system with applications to electronic voting |
authorStr |
Damgård, Ivan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)SPR009127291 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
A generalization of Paillier’s public-key system with applications to electronic voting Public-key encryption (dpeaa)DE-He213 Electronic voting (dpeaa)DE-He213 Homomorphic encryption (dpeaa)DE-He213 Zero-knowledge (dpeaa)DE-He213 |
topic |
misc Public-key encryption misc Electronic voting misc Homomorphic encryption misc Zero-knowledge |
topic_unstemmed |
misc Public-key encryption misc Electronic voting misc Homomorphic encryption misc Zero-knowledge |
topic_browse |
misc Public-key encryption misc Electronic voting misc Homomorphic encryption misc Zero-knowledge |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International Journal of Information Security |
hierarchy_parent_id |
SPR009127291 |
hierarchy_top_title |
International Journal of Information Security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)SPR009127291 |
title |
A generalization of Paillier’s public-key system with applications to electronic voting |
ctrlnum |
(DE-627)SPR009129405 (SPR)s10207-010-0119-9-e |
title_full |
A generalization of Paillier’s public-key system with applications to electronic voting |
author_sort |
Damgård, Ivan |
journal |
International Journal of Information Security |
journalStr |
International Journal of Information Security |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2010 |
contenttype_str_mv |
txt |
container_start_page |
371 |
author_browse |
Damgård, Ivan Jurik, Mads Nielsen, Jesper Buus |
container_volume |
9 |
format_se |
Elektronische Aufsätze |
author-letter |
Damgård, Ivan |
doi_str_mv |
10.1007/s10207-010-0119-9 |
author2-role |
verfasserin |
title_sort |
generalization of paillier’s public-key system with applications to electronic voting |
title_auth |
A generalization of Paillier’s public-key system with applications to electronic voting |
abstract |
Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. |
abstractGer |
Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. |
abstract_unstemmed |
Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER |
container_issue |
6 |
title_short |
A generalization of Paillier’s public-key system with applications to electronic voting |
url |
https://dx.doi.org/10.1007/s10207-010-0119-9 |
remote_bool |
true |
author2 |
Jurik, Mads Nielsen, Jesper Buus |
author2Str |
Jurik, Mads Nielsen, Jesper Buus |
ppnlink |
SPR009127291 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10207-010-0119-9 |
up_date |
2024-07-04T00:47:18.642Z |
_version_ |
1803607383625170944 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR009129405</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063515.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-010-0119-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR009129405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-010-0119-9-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Damgård, Ivan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A generalization of Paillier’s public-key system with applications to electronic voting</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public-key encryption</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic voting</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Homomorphic encryption</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Zero-knowledge</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jurik, Mads</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nielsen, Jesper Buus</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">9(2010), 6 vom: 30. Sept., Seite 371-385</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:9</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:6</subfield><subfield code="g">day:30</subfield><subfield code="g">month:09</subfield><subfield code="g">pages:371-385</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-010-0119-9</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">9</subfield><subfield code="j">2010</subfield><subfield code="e">6</subfield><subfield code="b">30</subfield><subfield code="c">09</subfield><subfield code="h">371-385</subfield></datafield></record></collection>
|
score |
7.399806 |