Paper 2012/185
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
Abstract
Helios 2.0 is a web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this paper we identify a vulnerability in Helios which allows an adversary to compromise the privacy of voters whom cast abstention votes. The vulnerability can be attributed to the absence of ballot independence and the use of homomorphic ElGamal encryption, in particular, these properties can be exploited by an adversary to construct a ballot related to an abstention vote cast by an honest voter and this ballot can be submitted by a corrupt voter to influence the election outcome, thereby introducing information that can be used to violate privacy. We demonstrate the attack by breaking privacy in a mock election using the current Helios implementation. It is unlikely that the vulnerability will be exploited in a real-world election and therefore our results are largely theoretical. Nonetheless, we cannot expect any computational proofs of ballot secrecy without fixing this vulnerability and, moreover, the attack methodology may be of interest -- in particular, it could represent a viable threat to existing protocols in the literature -- thus providing motivation to report these results.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- attackballot independenceballot secrecyelectronic votingHelioshomomorphic encryptionmalleabilityprivacy
- Contact author(s)
- toshiba @ bensmyth com
- History
- 2012-05-25: last of 2 revisions
- 2012-04-11: received
- See all versions
- Short URL
- https://ia.cr/2012/185
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/185, author = {Ben Smyth}, title = {Replay attacks that violate ballot secrecy in Helios}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/185}, year = {2012}, url = {https://eprint.iacr.org/2012/185} }