A Implementação de um Protocolo Criptográfico para Geração Distribuída de Credenciais no Sistema CIVIS
Abstract
The Internet election system CIVIS is based on a cryptographic voting protocol that enables resistance to coercive attacks. For this, it uses the idea of credentials. A credential consists of a set of bits that must be generated by a set of electoral authorities and delivered to each voter in secrecy. Otherwise, the protocol does not guarantee resistance to coercive attacks. In the current version of the CIVIS system, however, each credential is generated by single electoral authority. As a consequence, the system relies on this authority to be trusted to ensure secure credential generation. In this context, this work presents an implementation of a protocol for the distributed generation of credentials in order to make credential generation more secure in the CIVIS system.
References
Araújo, R., Neto, A., and Traoré, J. (2018). Civis - a coercion-resistant election system. In Anais do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pages 29–42, Porto Alegre, RS, Brasil. SBC.
Boneh, D. and Boyen, X. (2004). Short signatures without random oracles. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 56–73. Springer.
Gennaro, R., Jarecki, S., Krawczyk, H., and Rabin, T. (1999). Secure distributed key generation for discrete-log based cryptosystems. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 295–310. Springer.
Holovaty, A. and Kaplan-Moss, J. (2009). The denitive guide to Django: Web development done right. Apress.
Juels, A., Catalano, D., and Jakobsson, M. (2010). Coercion-resistant electronic elections. In Towards Trustworthy Elections, pages 37–63. Springer.
Pedersen, T. P. (1991). A threshold cryptosystem without a trusted party. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 522–526. Springer.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.
Silva Neto, A. A. and Araújo, R. (2017). A integração do criptossistema el gamal limiar In WTICG - SBSeg 2017, pages 697–706, ao sistema de votação via internet civis. Brasília, DF, Brasil. SBC.
Silva Neto, A. A., Sá, M. O. L. d., Araújo, R. S. d. S., Mota, M. P., Sampaio Neto, N. C., and Traoré, J. (2018). Usability considerations for coercion-resistant election systems. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, page 40. ACM.
Souheib, Y., Stephane, D., and Riadh, R. (2012). Watermarking in e-voting for large scale election. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on, pages 130–133. IEEE.
Van Rossum, G. and Drake, F. L. (2003). Python language reference manual. Network Theory United Kingdom.
Wang, H., Zhang, Y., and Feng, D. (2005). Short threshold signature schemes without random oracles. In International Conference on Cryptology in India, pages 297–310. Springer.
