next up previous
Next: Tallying Key Submission Protocol Up: Protocols Previous: Protocols

Registration Protocol

Registration protocol is used for the authority to authorize eligible voters, or in other words, for voters to register for elections. In term of registration, each voter generates a pair of keys (such as RSA public key and private key)gif, and has the authority blindly sign the public key, tallying key, and keeps the corresponding private key, voting key, for signing ballots in elections hereafter.
Voter V:

  1. Generates a pair of keys, tex2html_wrap_inline298 , tex2html_wrap_inline300 , where tex2html_wrap_inline302 is the voting key (private key) , used to sign the ballot, and tex2html_wrap_inline304 is the tallying key (public key), to be blindly signed by an authority.
  2. Generates a random number R.

  3. Computes: tex2html_wrap_inline308 , and sends it to the authority A.

Authority A:

  1. Checks the eligibility of V.
  2. If V is eligible, signs the data from V:

    displaymath290


    and sends the signed data, tex2html_wrap_inline320 to V.

Voter V:

  1. Removes R from tex2html_wrap_inline328 :

    displaymath291

  2. Checks:

    displaymath292

  3. If the equation holds, V can be convinced that the tex2html_wrap_inline332 is valid signature on his or her tallying key tex2html_wrap_inline334 .

Note: At the deadline of registration, the authority publishes the list of all registered voters.



Qi He
Thu Dec 25 16:06:46 EST 1997