Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Hillery, M. Ziman, V. Buzek, M. Bieliková (2005)
Towards quantum-based privacy and votingPhysics Letters A, 349
Jens Groth (2004)
Evaluating Security of Voting Schemes in the Universal Composability Framework
P. Ryan, Steve Schneider (2006)
Prêt à Voter with Re-encryption Mixes
S. Dolev, I. Pitowsky, B. Tamir (2006)
A quantum secret ballotArXiv, abs/quant-ph/0602087
Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan (2016)
(Universal) Unconditional Verifiability in E-Voting without Trusted PartiesRetrieved from https://arxiv:cs.CR/1610.06343.
H. Barnum, C. Crépeau, D. Gottesman, Adam Smith, A. Tapp (2001)
Authentication of quantum messagesThe 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings.
Gina Gallegos-García, Vincenzo Iovino, A. Rial, P. Rønne, P. Ryan (2016)
Universal Unconditional Verifiability in E-Voting without Trusted Parties2020 IEEE 33rd Computer Security Foundations Symposium (CSF)
A. Einstein, B. Podolsky, N. Rosen (1935)
Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?Physical Review, 47
Yuan Li, Guihua Zeng (2008)
Quantum anonymous voting systems based on entangled stateOptical Review, 15
Dominique Unruh (2009)
Universally Composable Quantum Multi-party ComputationArXiv, abs/0910.2912
P. Shor, J. Preskill (2000)
Simple proof of security of the BB84 quantum key distribution protocolPhysical review letters, 85 2
D. Chaum, R. Carback, Jeremy Clark, A. Essex, Stefan Popoveniuc, R. Rivest, P. Ryan, Emily Shen, A. Sherman, P. Vora (2009)
Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation CodesIEEE Transactions on Information Forensics and Security, 4
Anna Pappa, A. Chailloux, S. Wehner, E. Diamanti, Iordanis Kerenidis (2011)
Multipartite entanglement verification resistant against dishonest parties.Physical review letters, 108 26
Benoît Chevallier-Mames, Pierre-Alain Fouque, D. Pointcheval, Julien Stern, Jacques Traoré (2010)
On Some Incompatible Properties of Voting Schemes
Robert Koenig, S. Wehner, Jürg Wullschleger (2009)
Unconditional Security From Noisy Quantum StorageIEEE Transactions on Information Theory, 58
Rui-Rui Zhou, Li Yang (2013)
Distributed quantum election schemeArXiv, abs/1304.0555
Dominique Unruh (2018)
Quantum relational Hoare logicProceedings of the ACM on Programming Languages, 3
L’ULTIMO Assoluto, Della Relatività, Andrea Roselli (2011)
Can Quantum-Mechanical Description of Physical Reality Be Considered Complete ' ?
W. McCutcheon, A. Pappa, B. Bell, A. McMillan, A. Chailloux, T. Lawson, M. Mafu, D. Markham, E. Diamanti, Iordanis Kerenidis, J. Rarity, M. Tame (2016)
Experimental verification of multipartite entanglement in quantum networksNature Communications, 7
Ran Canetti (2001)
Universally composable security: A new paradigm for cryptographic protocolsProceedings of the 42nd IEEE Symposium on Foundations of Computer Science
Koutarou Suzuki, Tatsuaki Okamoto, Yuuki Tokunaga (2008)
Quantum voting scheme based on conjugate codingNTT Tech. Rev., 6
P. Xue, Xin Zhang (2017)
A simple quantum voting scheme with multi-qubit entanglementScientific Reports, 7
Véronique Cortier, D. Galindo, R. Küsters, J. Müller, T. Truderung (2016)
SoK: Verifiability notions for e-voting protocolsProceedings of the IEEE Symposium on Security and Privacy (SP’16)
Aggelos Kiayias, Moti Yung (2002)
Self-tallying elections and perfect ballot secrecyPublic Key Cryptography
I. B. Damgard, S. Fehr, L. Salvail, C. Schaffner (2005)
Cryptography in the bounded quantum-storage modelProceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
V. Cortier, C. Drăgan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, B. Warinschi (2017)
Machine-Checked Proofs of Privacy for Electronic Voting Protocols2017 IEEE Symposium on Security and Privacy (SP)
S. Delaune, S. Kremer, M. Ryan (2006)
Coercion-resistance and receipt-freeness in electronic voting19th IEEE Computer Security Foundations Workshop (CSFW'06)
R. Canetti (2001)
Universally composable security: a new paradigm for cryptographic protocolsProceedings 2001 IEEE International Conference on Cluster Computing
V. Cortier, P. Gaudry, Stéphane Glondu (2019)
Belenios: A Simple Private and Verifiable Electronic Voting System
Myrto Arapinis, Véronique Cortier, Steve Kremer (2016)
When are three voters enough for privacy properties? In Proceedings of the European Symposium on Research in Computer Security (ESORICS’16), Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows (EdsSpringer International Publishing
Myrto Arapinis, V. Cortier, S. Kremer (2016)
When Are Three Voters Enough for Privacy Properties?
(1984)
Quantum cryptography: Public key distribution and coin tossing
Article 111. Publication date
V. Cortier, D. Galindo, Ralf Küsters, Johannes Müller, Tomasz Truderung (2016)
SoK: Verifiability Notions for E-Voting Protocols2016 IEEE Symposium on Security and Privacy (SP)
I. Damgård, S. Fehr, L. Salvail, Christian Schaffner (2005)
Cryptography in the bounded quantum-storage modelIEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005.
N. Bao, Nicole Halpern (2015)
Quantum voting and violation of Arrow's Impossibility TheoremPhysical Review A, 95
H. Lo, H. Chau (1996)
Why quantum bit commitment and ideal quantum coin tossing are impossiblePhysica D: Nonlinear Phenomena, 120
D. Mayers (1996)
Unconditionally secure quantum bit commitment is impossiblePhysical Review Letters, 78
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang (2015)
End-to-end verifiable elections in the standard modelProceedings of the Advances in Cryptology Conference (EUROCRYPT’15)
T. Lunghi, J. Kaniewski, F. Bussières, Raphael Houlmann, Marco Tomamichel, Stephanie Wehner, Hugo Zbinden (2014)
Practical Relativistic Bit Commitment.Physical review letters, 115 3
B. Adida (2008)
Helios: Web-based Open-Audit Voting
Howard Barnum, Claude Crépeau, Daniel Gottesman, Adam Smith, Alain Tapp (2002)
Authentication of quantum messagesProceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science. IEEE
Anne Broadbent, Alain Tapp (2007)
Information-theoretic security without an honest majorityProceedings of the Advances in Cryptology Conference (ASIACRYPT’07)
Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, Jacques Traoré (2010)
On Some Incompatible Properties of Voting SchemesSpringer
C. Portmann (2016)
Quantum Authentication with Key RecyclingArXiv, abs/1610.03422
A. Broadbent, A. Tapp (2007)
Information-Theoretic Security Without an Honest Majority
T. Moran, M. Naor (2006)
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
Qingle Wang, Chao-Hua Yu, F. Gao, H. Qi, Q. Wen (2016)
Self-tallying quantum anonymous votingPhysical Review A, 94
A. Kiayias, T. Zacharias, Bingsheng Zhang (2015)
End-to-End Verifiable Elections in the Standard ModelIACR Cryptol. ePrint Arch., 2015
Kishore Thapliyal, R. Sharma, A. Pathak (2017)
Protocols for quantum binary votingInternational Journal of Quantum Information, 15
D. Horoshko, S. Kilin (2009)
Quantum anonymous voting with anonymity checkPhysics Letters A, 375
Wei Huang, Q. Wen, B. Liu, Qi Su, S. Qin, F. Gao (2014)
Quantum anonymous rankingPhysical Review A, 89
Anna Pappa, P. Jouguet, T. Lawson, A. Chailloux, M. Legre, P. Trinkler, Iordanis Kerenidis, E. Diamanti (2013)
Experimental plug and play quantum coin flippingNature Communications, 5
P. Shor (1994)
Algorithms for quantum computation: discrete logarithms and factoringProceedings 35th Annual Symposium on Foundations of Computer Science
F. Dupuis, J. Nielsen, L. Salvail (2012)
Actively Secure Two-Party Evaluation of Any Quantum Operation
Véronique Cortier, C. C. Drágan, F. Dupressoir, B. Schmidt, P. Strub, B. Warinschi (2017)
Machine-checked proofs of privacy for electronic voting protocolsProceedings of the IEEE Symposium on Security and Privacy (SP’17)
Michael A. Nielsen, Isaac L. Chuang (2011)
Quantum Computation and Quantum InformationCambridge University Press
M. Bonanome, V. Buzek, M. Hillery, M. Ziman (2011)
Toward protocols for quantum-ensured privacy and secure votingPhysical Review A, 84
A. Chailloux, Iordanis Kerenidis (2009)
Optimal Quantum Strong Coin Flipping2009 50th Annual IEEE Symposium on Foundations of Computer Science
Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène (2016)
A Homomorphic LWE Based E-voting Scheme
E. Kashefi, Luka Music, P. Wallden (2017)
The Quantum Cut-and-Choose Technique and Quantum Two-Party ComputationArXiv, abs/1703.03754
D. Bernhard, V. Cortier, D. Galindo, Olivier Pereira, B. Warinschi (2015)
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions2015 IEEE Symposium on Security and Privacy
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora (2009)
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codesIEEE Trans. Info. Forens. Secur., 4
J. Vaccaro, J. Vaccaro, Joseph Spring, A. Chefles (2005)
Quantum protocols for anonymous voting and surveyingPhysical Review A, 75
A. Kiayias, M. Yung (2002)
Self-tallying Elections and Perfect Ballot Secrecy
S. Gay, R. Nagarajan, Nikolaos Papanikolaou (2007)
QMC: A Model Checker for Quantum Systems
A. Juels, D. Catalano, M. Jakobsson (2005)
Coercion-resistant electronic elections
Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims that are never formalized and are at best justified only against specific attacks. To address this, we propose the first formal security definitions for quantum e-voting protocols. With these at hand, we systematize and evaluate the security of previously proposed quantum e-voting protocols; we examine the claims of these works concerning privacy, correctness, and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identify specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and references to the existing cryptographic literature.
ACM Transactions on Quantum Computing – Association for Computing Machinery
Published: Apr 14, 2021
Keywords: Quantum electronic voting
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.