Electronic Voting Systems
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic voting system, including: a voting device to generate, in response to a voter selection for each of a plurality of voters an encrypted electronic ballot and a printed ballot, both having voter selection data indicating a said voter'"'"'s choice, said electronic ballot including information to link it to said printed ballot and vice-versa; an electronic vote decryption system configured to decrypt said encrypted electronic ballots including said linking information; and a voting verification system to receive decrypted voter selection data and linking information from said vote decryption system, to receive voter selection data and linking information from said printed ballots and to compare voters'"'"' choices for a sample of said printed and electronic ballots linked by said linking information, to verify the voting.
34 Citations
85 Claims
-
1-43. -43. (canceled)
-
44. An electronic voting system, the system comprising:
-
a voting device configured to generate, in response to a voter selection for each of a plurality of voters an encrypted electronic ballot and a printed ballot, both having voter selection data indicating a said voter'"'"'s choice, said electronic ballot including information to link it to said printed ballot and said printed ballot including information to link it to said electronic ballot;
an electronic vote decryption system configured to receive electronic ballots from said voting device and to decrypt said encrypted electronic ballots including said linking information; and
a voting verification system configured to receive decrypted voter selection data and linking information from said vote decryption system, to receive voter selection data and linking information from said printed ballots and to compare voters choices for a sample of said printed and electronic ballots linked by said linking information, to verify the voting. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
- 63. A printed ballot for an electronic voting system configured to count electronic ballots corresponding to printed ballots, said printed ballot bearing information linking the ballot to a said electronic ballot and information to allow a voter to identify one or more choices, the printed ballot being configured or configurable such that said linking information and said choice identification information are both visible, but not simultaneously.
-
65. A method of operating an electronic voting system, the method comprising:
-
collecting a vote from a voter;
outputting vote as both an encrypted electronic ballot and a printed ballot, each of said printed and encrypted electronic ballots bearing information linking it to the other;
displaying the printed ballot to the voter;
collecting the printed ballot;
repeating said collecting, outputting, displaying and collecting for a plurality of other voters;
decrypting and counting said electronic ballots;
selecting a sample of said printed or electronic ballots and reading voter choices for said sample;
reading voter choices for electronic or printed ballots linked to said selected ballots by said linking information; and
comparing said voter choices read from said sample and said linked ballots to verify a result of said voting. - View Dependent Claims (66, 67, 68, 69, 70)
-
- 71. A method of committing to an electronic data value, the method comprising selecting a substantially random number and a sub group of the multiplication group Z*n of integers computed modulo n where n is a product of two primes for the electronic data value and/or said substantially random number and determining a commitment value from said electronic data value and said substantially random number using said subgroup.
-
72. A method of providing information for verifying correctness of a permutation of encrypted messages performed using one or more data processing entities, the method comprising:
-
sending a commitment (cs) to a first set of values (π
) defining said permutation to a verifier;
receiving a second set of values (t) from said verifier;
permuting said second set of values with said permutation;
sending a commitment (ct) to said permuted second set of values to said verifier; and
sending additional information to said verifier for verifying correctness of said permutation, said additional information verifying that said second set of values was permuted with said permutation. - View Dependent Claims (73)
-
-
74. A method of providing information for verifying correctness of a combined permutation and partial decryption of encrypted messages performed using one or more data processing entities, the method comprising:
sending information to said verifier for verifying correctness of said combined permutation and partial decryption, said information comprising information to enable said verifier to verify said performance using a zero-knowledge protocol. - View Dependent Claims (75)
- 76. A method of shuffling and decrypting encrypted electronic data using a plurality of data processing entities, each entity having a share of a secret key, the method comprising, at each of said entities, partially decrypting and re-randomizing said electronic data using said secret key share such that a final said data processing utility fully decrypts said data.
-
79. A method, in a computer system, of providing data for verifying that messages of a set of messages provided from a corresponding set of entities are authentic, the method comprising:
-
selecting, for each said entity, first second and third random numbers;
determining, for each said entity, first and second verification values from, respectively, said first and second random numbers and said entity'"'"'s message, and said first and third random numbers; and
outputting, for each entity, said entity'"'"'s message and said first and second verification values.
-
-
80. A method for providing data for verification systems for verifying that messages m1, . . . ,mk are authentic using a homomorphic verification system without revealing their origin, the method comprising entities {Ej} producing the messages each choosing random numbers ej, rj and ρ
-
j and submitting mj, V(ej, rj) anonymously to one entity (entity A) and V(mj ej, ρ
j) to another entity (entity B) where V is a verification function, in particular a homomorphic function, in such a way that the messages are authenticated. - View Dependent Claims (81, 82, 83, 84)
-
j and submitting mj, V(ej, rj) anonymously to one entity (entity A) and V(mj ej, ρ
Specification