Oblivious counter and majority protocol

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The paper presents a new protocol for counting 1-bit secrets without revealing if the bit is 1 or 0 in publicly verifiable way. Other than the conventional multi-party protocols that involve enormous number of rounds and huge bandwidth consumption, the proposed protocol, based on the Mix and Match approach [2] in which computations are dealt with ciphertexts, requires a non-interactive constant number of round and simple but verifiable computation for both of sender and counter. The expected application of proposed protocol is an (one-bit) secret voting in which voters cast a ballot encrypted by a public key and an oblivious party (counter) makes a tally of how many votes are polled. The final tally is represented as a k-digit binary register consisting of k ciphertexts that only collaboration of distributed authorities can decrypt. Opening only the MSB of ciphtertexts allows us to see if more than half voters cast “Yes” or not without revealing the details of total number. The cost for opening is O(log n), where n is a number of voters. With the proof of knowledge, voters can prove that the vote is either 1 or 0 without revealing their privacy. The proposed protocol is universally verifiable because any third party can verify that voters, a counter and administrators do not violate the protocol. The protocol is robust against up to a constant number of malicious administrators using standard threshold scheme.

Original languageEnglish
Title of host publicationInformation Security - 5th International Conference, ISC 2002, Proceedings
EditorsAgnes Hui Chan, Virgil Gligor
PublisherSpringer Verlag
Pages437-445
Number of pages9
ISBN (Print)3540442707, 9783540442707
Publication statusPublished - 1 Jan 2002
Event5th International Conference on Information Security, ISC 2002 - Sao Paulo, Brazil
Duration: 30 Sep 20022 Oct 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2433
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Information Security, ISC 2002
CountryBrazil
CitySao Paulo
Period30/09/022/10/02

Fingerprint Dive into the research topics of 'Oblivious counter and majority protocol'. Together they form a unique fingerprint.

  • Cite this

    Kikuchi, H. (2002). Oblivious counter and majority protocol. In A. H. Chan, & V. Gligor (Eds.), Information Security - 5th International Conference, ISC 2002, Proceedings (pp. 437-445). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2433). Springer Verlag.