hjugement-protocol: A cryptographic protocol for the Majority Judgment.

[ gpl, library, politic ] [ Propose Tags ]

This work-in-progress library aims at implementing an online voting protocol named Helios-C (Helios with Credentials) by its authors from the CNRS, the INRIA and the Université de Lorraine: Véronique Cortier, David Galindo, Pierrick Gaudry, Stéphane Glondu and Malika Izabachène.

The main properties of this protocol are:


[Skip to Readme]
Versions [faq] 0.0.0.20190428, 0.0.0.20190501, 0.0.0.20190511, 0.0.0.20190513, 0.0.0.20190519, 0.0.1.20190623, 0.0.4.20190711, 0.0.7.20190815
Dependencies aeson (>=1.3), base (>=4.6 && <5), base64-bytestring (>=1.0), binary (>=0.8), bytestring (>=0.10), containers (>=0.5), cryptonite (>=0.25), deepseq (>=1.4), memory (>=0.14), random (>=1.1), reflection (>=2.1), text (>=1.2), transformers (>=0.5), unordered-containers (>=0.2.8) [details]
License GPL-3.0-only
Author Julien Moutinho <julm+hjugement@autogeree.net>
Maintainer Julien Moutinho <julm+hjugement@autogeree.net>
Category Politic
Bug tracker Julien Moutinho <julm+hjugement@autogeree.net>
Source repo head: git clone git://git.autogeree.net/hjugement
Uploaded by julm at Fri Aug 16 13:06:04 UTC 2019
Distributions NixOS:0.0.7.20190815
Downloads 470 total (80 in the last 30 days)
Rating (no votes yet) [estimated by rule of succession]
Your Rating
  • λ
  • λ
  • λ
Status Hackage Matrix CI
Docs available [build log]
Last success reported on 2019-08-16 [all 1 reports]

Modules

[Index] [Quick Jump]

Downloads

Maintainer's Corner

For package maintainers and hackage trustees


Readme for hjugement-protocol-0.0.7.20190815

[back to package description]

Voting protocol

Ballot

Ballots are encrypted using public-key cryptography secured by the <i>Discrete Logarithm problem</i>: finding x in <code>(g^x mod p)</code>, where p is a large prime and g a generator of Gq, the multiplicative subgroup of order q, in Fp (the finite prime field whose characteristic is p).

Here, p is 2048-bit and q is 256-bit.

The signing (Schnorr-like), the encrypting (ElGamal-like) and the <i>Decisional Diffe Hellman</i> (DDH) assumption, all rely on the hardness of that problem.

Ballot signing

The <i>Schnorr protocol</i> is used to prove that a voter has knowledge of the secret key used to sign their votes.

Voter's credential

A voter's credential is a secret key (the signing key) from which a public part can be derived (the verification key).

The association between the public part and the corresponding voter's identity does not need to be known, and actually should not be disclosed to satisfy e.g. the French requirements regarding voting systems. Using credentials prevent the submission of duplicated ballots (because they are added as an additional input to the random oracle in the <i>non-interactive zero-knowledge</i> (NIZK) proofs for ciphertext well-formedness). This allows a testing of duplicates which depends only on the size of the number of voters, and thus enables Helios-C to scale for larger elections while attaining correctness.

Tallying

Ballots are added without being decrypted because adding (multiplying actually) ciphertexts then decrypting, is like decrypting then adding plaintexts (<i>additive homomorphism</i>). Which requires to solve the <i>Discrete Logarithm Problem</i> for numbers in the order of the number of voters, which is not hard for small numbers (with a lookup table as here, or with Pollard’s rho algorithm for logarithms).

Verifying

The <i>Chaum-Pedersen protocol</i> (proving an equality of discrete logarithms) is used to prove that ciphertexts are well-formed (encrypting a 0 or a 1… or any expected natural) without decrypting them. Which is known as a <i>Disjunctive Chaum-Pedersen</i> proof of partial knowledge.
See: Some ZK security proofs for Belenios.

A <i>strong Fiat-Shamir transformation</i> is used to transform the <i>interactive zero-knowledge</i> (IZK) <i>Chaum-Pedersen protocol</i> into a <i>non-interactive zero-knowledge</i> (NIZK) proof, using a SHA256 hash.
See: How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.

Public Key Infrastructure

(TODO) A Pedersen's <i>distributed key generation</i> (DKG) protocol coupled with ElGamal keys (under the DDH assumption), is used to have a fully distributed semantically secure encryption.