HOME

TheInfoList



OR:

Direct Recording Electronic with Integrity (DRE-i) is an End-to-End (E2E) verifiable e-voting system, first designed by Feng Hao and Matthew Kreeger in 2010 and formally published in 2014 with additional authors
Brian Randell Brian Randell (born 1936) is a British computer scientist, and Emeritus Professor at the School of Computing, Newcastle University, United Kingdom. He specialises in research into software fault tolerance and dependability, and is a noted auth ...
, Dylan Clarke, Siamak Shahandashti, and Peter Hyun-Jeen Lee. Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, and Peter Hyun-Jeen Lee
"Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting"
''USENIX Journal of Election Technology and Systems (JETS)'' Volume 2, Number 3, July 2014
DRE-i is the first E2E verifiable e-voting system without involving any tallying authorities. The authors call such a tallying-authority-free E2E voting system "self-enforcing e-voting". The removal of tallying authorities is realized in DRE-i by pre-computing encrypted ballots in a structured way such that after the election, multiplying the ciphertexts will cancel out all the random factors, hence allowing any public observer to verify the tallying integrity. An improved version called
DRE-i with enhanced privacy Direct Recording Electronic with Integrity and Enforced Privacy (DRE-ip) is an End-to-End (E2E) verifiable e-voting system without involving any tallying authorities, proposed by Siamak Shahandashti and Feng Hao in 2016. It improves a previo ...
(DRE-ip), which adopts a real-time computation strategy instead of a pre-computation strategy, was successfully trialed in a polling station in Gateshead during the 2019 UK local elections.


Protocol

Let p and q be two large primes, where q\,, \, p-1. Let g be a generator for the subgroup of Z_p^* of the prime order q. The parameters (p, q, g) are publicly agreed before the election. All modulo operations are performed with respect to the modulus p. The protocol can also be implemented using an
elliptic curve In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If ...
, while the specification remains the same. In the following example, the protocol is explained in the context of a single-candidate Yes/No election held at supervised polling stations using touch-screen
DRE DRE may refer to: * ''Dre'' (album), 2010 by American rapper Soulja Boy Tell 'Em, 2010 * Dre (name) **Dr. Dre, American rapper and producer * DRE voting machine * Digital rectal examination, in medicine * Director of religious education; for exam ...
machines. There are standard ways to extend a single candidate election to support multiple candidates, e.g., providing a Yes/No selection for each of the candidates or using encoded values for candidates. The protocol can also be implemented for Internet voting as done for verifiable classroom voting. The DRE-i protocol consists of three phases: setup, voting and tallying.


Setup

A DRE-i implementation may include a server and distributed DRE clients that connect to the server through a secure channel. Before the election, the server pre-computes a table as shown below. The table contains n rows with each row corresponding to a ballot. The number n is larger than the maximum number of the eligible voters to accommodate voter auditing. For each of the n ballots, the server chooses a random secret key x_\in_ ,q-1/math> and computes the corresponding public key g^. When this has been done for all ballots, the server computes a restructured public key for every ballot as follows:
g^=\prod_g^/\prod_g^
The Yes/No value in each ballot is encrypted in the form of C_=g^\cdot g^ where v_ = 0 for "No" and 1 for "Yes". In addition, the machine computes a 1-out-of-2
Zero-knowledge proof In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
(ZKP) for each Yes/No value. This is to ensure that the encrypted vote is well-formed. In other words, the value of the vote v_ can only be either 0 or 1. When the pre-computation is finished, the server publishes all the random public keys and restructured public keys (first three columns of the setup table) while keeping the Yes and No cryptograms secret (last two columns).


Voting

After authentication at a polling station, a voter obtains a random password or a smart card and logs onto a DRE client in a private voting booth. Casting a vote involves two basic steps. * In step one, the voter selects a choice, "Yes" or "No", for the candidate shown on the touch screen. Upon the selection, the DRE machine prints the following data on the paper receipt: the ballot serial number i, and the cryptogram of the selected choice, along with a digital signature for proving the data authenticity. * In step two, the voter has the option to either confirm or cancel the previous selection. If the confirm option is chosen, the machine prints a “finish” on the paper receipt with a digital signature to indicate that a valid ballot has been cast. On the other hand, if the cancel option is selected, the machine prints the canceled candidate choice in plain text and the other cryptogram, along with a digital signature. In this case, a dummy vote has been cast. The voter should check if the canceled candidate choice printed on the receipt matches their selection; if not, a dispute should be raised to the election staff at the polling station. This "confirm/cancel" option enables a voter to verify that the vote is "cast as intended". The voter can cast as many dummy votes as they wish (subject to a reasonable limit), but is allowed to cast only one valid vote. All receipts are published on a public bulletin board (i.e., a mirrored public website), together with digital signatures to prove the data authenticity. After voting, the voter leaves the voting booth with a receipt (or more than one receipt if the voter chooses to cancel ballots). The voter checks if the same content of the receipt is published on the bulletin board. This ensures their vote is "recorded as cast".


Tallying

When the election is finished, the server announces the tally of the "Yes" votes. In addition, it publishes the "Yes" and "No" cryptograms for all the unused ballots on the bulletin board, as if they were canceled by voters. An example of the bulletin board after the election is shown below. To verify the tally announced by the server, one simply multiplies all the published votes V_i. For canceled (dummy) and unused votes, only the no-votes are included in the multiplication.
\prod_V_=\prod_i g^g^=\prod_g^=g^
In the above computation, all random factors are cancelled out on the exponent because \sum_i = 0 based on a cancellation technique used in
Anonymous veto network In cryptography, the anonymous veto network (or AV-net) is a multi-party secure computation protocol to compute the boolean-OR function. It was first proposed by Feng Hao and Piotr Zieliński in 2006. This protocol presents an efficient solution to ...
. This leaves only \sum_i v_i on the exponent. To verify the tally t announced by the server, one just needs to check if the following equation holds. This ensures all votes are "tallied as recorded", which together with the earlier assurance on "cast as intended" and "recorded as cast" ensures the entire voting process is end-to-end verifiable.
\prod_i V_i \; \overset \; g^t


Implementation and practical applications

A prototype of a verifiable classroom voting system, based on the DRE-i protocol, has been implemented for pedagogical purposes and used for classroom voting and student prize competitions.


Limitation

The DRE-i protocol works by pre-computing the encrypted ballots. However, the pre-computed ballots need to be stored securely. If the pre-computed ballots are revealed, the secrecy of the votes will be compromised (however, the tallying integrity remains intact as guaranteed by the end-to-end verifiability). This limitation is addressed by using a different real-time computation strategy which leads to an improved protocol called
DRE-i with enhanced privacy Direct Recording Electronic with Integrity and Enforced Privacy (DRE-ip) is an End-to-End (E2E) verifiable e-voting system without involving any tallying authorities, proposed by Siamak Shahandashti and Feng Hao in 2016. It improves a previo ...
(DRE-ip). Both the DRE-i and DRE-ip protocols are end-to-end verifiable without tallying authorities, in contrast to other E2E verifiable e-voting schemes that involve tallying authorities for performing decryption and tallying operations.


See also

*
DRE voting machine A DRE voting machine, or direct-recording electronic voting machine, records votes by means of a ballot display provided with mechanical or electro-optical components that can be activated by the voter. These are typically buttons or a touchscr ...


References

{{Reflist Applications of cryptography Electronic voting methods