zkVoting: A Novel Approach to Coercion-Resistant and End-to-End Verifiable Electronic Voting

zero knowledge proof voting

The paper introduces zkVoting, an innovative electronic voting system that aims to address two critical challenges in remote voting: coercion resistance and end-to-end (E2E) verifiability. By leveraging a novel cryptographic primitive called nullifiable commitments, zkVoting offers a promising solution that balances security, privacy, and practicality.

The Need for Secure Remote Voting

As technology advances, there is growing interest in remote electronic voting systems that can enhance efficiency and accessibility. However, these systems face significant challenges, particularly in ensuring voter privacy and election integrity. Two key requirements have emerged as essential for secure e-voting:

  1. Coercion resistance: The system must prevent adversaries from compelling voters to vote in a certain way or abstain from voting.
  2. End-to-end verifiability: Voters should be able to verify that their votes are cast as intended, recorded as cast, and tallied as recorded.

Previous approaches to achieving these goals have had limitations. Systems using fake credentials, like JCJ and Civitas, suffer from high computational complexity during tallying. Revoting-based systems like VoteAgain and Loki rely on strong trust assumptions or face scalability issues. zkVoting aims to overcome these limitations through a novel cryptographic approach.

The Nullifiable Commitment Scheme

At the heart of zkVoting is the nullifiable commitment scheme, a new cryptographic primitive introduced in this paper. This scheme allows a trusted entity (the registrar) to issue both real and fake commitment keys to voters. Each voter receives one real key and can obtain multiple fake keys.

Key properties of the nullifiable commitment scheme include:

  1. Hiding: Commitments do not reveal the underlying message, even to the holder of the master secret key.
  2. Binding: Once a message is committed, it cannot be changed.
  3. Nullifiability: Using the master secret key, commitments can be “nullified.” Nullified real commitments open to the original message, while fake ones open to zero.
  4. Indistinguishability: Real and fake keys are computationally indistinguishable.
  5. Key deniability: Voters can plausibly deny having a fake key, enhancing coercion resistance.
  6. Homomorphism: Commitments can be aggregated, simplifying the tallying process.

The authors provide a concrete construction of a nullifiable commitment scheme based on elliptic curve cryptography, proving its security under the discrete logarithm and decisional Diffie-Hellman assumptions.

zkVoting System Design

Building on the nullifiable commitment scheme, zkVoting incorporates several key components:

  1. Setup: The authority generates public parameters and secret keys for the election.
  2. Registration: Voters register their public keys and obtain casting keys (commitment keys) from the registrar.
  3. Voting: Voters create ballots using their casting keys, encrypting their votes and generating zero-knowledge proofs of correctness.
  4. Tallying: The authority decrypts ballots, nullifies commitments, and produces a proof of correct tallying.
  5. Verification: Anyone can verify the correctness of the tally using zero-knowledge proofs.

Key innovations in zkVoting include:

  • Use of serial numbers to prevent double voting and enhance verifiability
  • Integration of zero-knowledge proofs for various steps of the protocol
  • Efficient tallying through homomorphic aggregation of nullified commitments

Security Properties

The authors provide formal security definitions and proofs for zkVoting, demonstrating that it achieves:

  1. Ballot privacy: Votes remain secret.
  2. Receipt-freeness: Voters cannot prove how they voted.
  3. Coercion resistance: Voters can cast their intended vote despite coercion attempts.
  4. End-to-end verifiability: Voters can verify their votes are included correctly in the tally.
  5. Eligibility verifiability: Only eligible voters can cast ballots.
  6. Voter anonymity: Ballots do not reveal voter identities.

The coercion resistance proof considers four attack scenarios: demanding a casting key, requiring key absence, instructing a specific vote, and forcing voter absence. In each case, zkVoting allows voters to use fake keys to evade coercion while still casting their intended vote with a real key.

Practical Implementation and Performance

The authors implemented zkVoting using modern cryptographic tools:

  • Gro16 zk-SNARK system for efficient zero-knowledge proofs
  • MiMC7 hash function optimized for zk-SNARKs
  • Elliptic curve cryptography for the nullifiable commitment scheme

Performance results show promise for real-world deployment:

  • Voting time: 2.3-6.6 seconds on various smartphone devices
  • Ballot verification: 347,363 gas on Ethereum (suitable for a dedicated sidechain)
  • Tallying: 3.9ms per ballot decryption, 360ms for tally proof generation

These results compare favorably to previous coercion-resistant systems, offering improved efficiency and scalability.

Analysis and Implications

zkVoting represents a significant advancement in secure electronic voting systems. Its key strengths include:

  1. Strong security properties: By achieving coercion resistance and E2E verifiability simultaneously, zkVoting addresses critical vulnerabilities in remote voting.
  2. Efficient tallying: The use of nullifiable commitments allows for O(n) tallying complexity, a substantial improvement over previous fake credential approaches.
  3. Reduced trust assumptions: Unlike some revoting-based systems, zkVoting does not require trusting additional parties for coercion resistance.
  4. Practical performance: The implementation results suggest zkVoting could be feasible for real-world elections, even on mobile devices.
  5. Flexible design: The use of a compiler approach allows for modular improvements and adaptations of the system.

However, some potential limitations and areas for further research include:

  1. Trusted setup: The system relies on a trusted setup phase for generating public parameters. Exploring ways to distribute this trust or eliminate the need for trusted setup could further enhance security.
  2. Blockchain scalability: While the use of a blockchain bulletin board enhances transparency, the current gas costs on public networks like Ethereum may be prohibitive. Dedicated sidechains or alternative consensus mechanisms might be necessary for large-scale deployments.
  3. User experience: The paper focuses primarily on cryptographic protocols and performance. Further research into the user interface and experience of such a system would be valuable for real-world adoption.
  4. Long-term security: As quantum computing advances, the underlying cryptographic assumptions may need to be re-evaluated. Exploring post-quantum variants of the nullifiable commitment scheme could be an important direction for future work.

Broader Implications

The development of zkVoting has implications beyond just electronic voting:

  1. Cryptographic innovation: The nullifiable commitment scheme introduced in this paper could find applications in other domains requiring deniability or selective disclosure of information.
  2. Privacy-preserving systems: The techniques used in zkVoting might inspire new approaches to privacy-preserving computation and data sharing in other fields.
  3. Democratic processes: As remote voting becomes more prevalent, systems like zkVoting could play a crucial role in maintaining the integrity and security of democratic institutions.
  4. Blockchain applications: The integration of zero-knowledge proofs and custom cryptographic primitives with blockchain technology demonstrates the potential for building complex, secure systems on these platforms.

Conclusion

zkVoting represents a significant step forward in the quest for secure and verifiable remote voting systems. By introducing the novel nullifiable commitment scheme and cleverly combining it with existing cryptographic techniques, the authors have created a system that addresses many of the shortcomings of previous approaches.

The ability to achieve coercion resistance with efficient tallying, while maintaining end-to-end verifiability, positions zkVoting as a promising candidate for future electronic voting implementations. As remote voting continues to gain importance in our increasingly digital world, systems like zkVoting will play a crucial role in ensuring the security, privacy, and integrity of democratic processes.

While there are still challenges to address in terms of real-world deployment and user experience, the theoretical foundations and initial performance results of zkVoting are encouraging. Future research building on this work has the potential to bring us closer to widely adopted, secure remote voting systems that can enhance participation and trust in democratic institutions.

As we continue to navigate the complex intersection of technology and democracy, innovations like zkVoting remind us of the power of cryptography and careful system design to solve critical societal challenges. By pushing the boundaries of what’s possible in secure multi-party computation, zkVoting not only advances the field of electronic voting but also contributes valuable insights to the broader landscape of privacy-preserving technologies.

Read the full pdf here:

author avatar
digitaldemocracyforum.com

Leave a Reply

Your email address will not be published. Required fields are marked *