A Implementação de um Protocolo Criptográfico para Geração Distribuída de Credenciais no Sistema CIVIS

  • Matheus de Sá UFPA
  • Roberto Araújo UFPA

Abstract


The Internet election system CIVIS is based on a cryptographic voting protocol that enables resistance to coercive attacks. For this, it uses the idea of credentials. A credential consists of a set of bits that must be generated by a set of electoral authorities and delivered to each voter in secrecy. Otherwise, the protocol does not guarantee resistance to coercive attacks. In the current version of the CIVIS system, however, each credential is generated by single electoral authority. As a consequence, the system relies on this authority to be trusted to ensure secure credential generation. In this context, this work presents an implementation of a protocol for the distributed generation of credentials in order to make credential generation more secure in the CIVIS system.

References

Araújo, R., Rajeb, N., Robbana, R., Traoré, J., and Yous, S. (2010). Towards practical and secure coercion-resistant electronic elections. In Cryptology and Network Security - 9th International Conference, CANS 2010, volume 6467, pages 278–297. Springer.

Araújo, R., Neto, A., and Traoré, J. (2018). Civis - a coercion-resistant election system. In Anais do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pages 29–42, Porto Alegre, RS, Brasil. SBC.

Boneh, D. and Boyen, X. (2004). Short signatures without random oracles. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 56–73. Springer.

Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T. (1999). Secure distributed key generation for discrete-log based cryptosystems. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 295–310. Springer.

Holovaty, A. and Kaplan-Moss, J. (2009). The denitive guide to Django: Web development done right. Apress.

Juels, A., Catalano, D., and Jakobsson, M. (2010). Coercion-resistant electronic elections. In Towards Trustworthy Elections, pages 37–63. Springer.

Pedersen, T. P. (1991). A threshold cryptosystem without a trusted party. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 522–526. Springer.

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.

Silva Neto, A. A. and Araújo, R. (2017). A integração do criptossistema el gamal limiar In WTICG - SBSeg 2017, pages 697–706, ao sistema de votação via internet civis. Brasília, DF, Brasil. SBC.

Silva Neto, A. A., Sá, M. O. L. d., Araújo, R. S. d. S., Mota, M. P., Sampaio Neto, N. C., and Traoré, J. (2018). Usability considerations for coercion-resistant election systems. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, page 40. ACM.

Souheib, Y., Stephane, D., and Riadh, R. (2012). Watermarking in e-voting for large scale election. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on, pages 130–133. IEEE.

Van Rossum, G. and Drake, F. L. (2003). Python language reference manual. Network Theory United Kingdom.

Wang, H., Zhang, Y., and Feng, D. (2005). Short threshold signature schemes without random oracles. In International Conference on Cryptology in India, pages 297–310. Springer.
Published
2019-09-02
DE SÁ, Matheus; ARAÚJO, Roberto. A Implementação de um Protocolo Criptográfico para Geração Distribuída de Credenciais no Sistema CIVIS. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 61-70. DOI: https://doi.org/10.5753/sbseg_estendido.2019.14007.