skip to main content
10.5555/648118.746742guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System

Published: 13 February 2001 Publication History

Abstract

We propose a generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property. We show that the generalisation is as secure as Paillier's original system.
We construct a threshold variant of the generalised scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts.
We then show how these building blocks can be used for applying the scheme to efficient electronic voting.This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes.W e show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimised such that for a certain range of parameter values, a ballot has size only O(log L) bits.

References

[1]
Baudron, Fouque, Pointcheval, Poupard and Stern: Practical Multi-Candidate Election Scheme, manuscript, May 2000.
[2]
Cramer, Damg�rd and Schoenmakers: Proofs of partial knowledge, Proc.of Crypto 94, Springer Verlag LNCS series nr. 839.
[3]
R. Cramer, S. Dziembowski, I. Damg�rd, M. Hirt and T. Rabin: Efficient Multiparty Computations Secure against an Adaptive Adversary, Proc. of EuroCrypt 99, Springer Verlag LNCS series 1592, pp. 311-326.
[4]
R. Cramer, R. Gennaro, B. Schoenmakers: A Secure and Optimally Efficient Multi-Authority Election Scheme, Proceedings of EuroCrypt 97, Springer Verlag LNCS series, pp. 103-118.
[5]
Frankel, MacKenzie and Yung: Robust Efficient Distributed RSA-key Generation, proceedings of STOC 98.
[6]
P. Fouque, G.P oupard, J. Stern: Sharing Decryption in the Context of Voting or Lotteries, Proceedings of Financial Crypto 2000.
[7]
L. Guillou and J.-J. Quisquater: A Practical Zero-Knowledge Protocol fitted to Security Microprocessor Minimizing both Transmission and Memory, Proc. of EuroCrypt 88, Springer Verlag LNCS series.
[8]
M. Hirt and K. Sako: Efficient Receipt-Free Voting based on Homomorphic Encryption, Proceedings of EuroCrypt 2000, Springer Verlag LNCS series, pp. 539-556.
[9]
P. Pallier: Public-Key Cryptosystems based on Composite Degree Residue Classes, Proceedings of EuroCrypt 99, Springer Verlag LNCS series, pp. 223-238.
[10]
V. Shoup: Practical Threshold Signatures, Proceedings of EuroCrypt 2000, Springer Verlag LNCS series, pp. 207-220.
[11]
J. Bar-Ilan, and D. Beaver: Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds, Proceedings of the ACM Symposium on Principles of Distributed Computation, 1989, pp. 201-209.

Cited By

View all
  • (2023)Balancing Security and Privacy in Genomic Range QueriesACM Transactions on Privacy and Security10.1145/357579626:3(1-28)Online publication date: 13-Mar-2023
  • (2021)Privacy-aware Character Pattern Matching over Outsourced Encrypted DataDigital Threats: Research and Practice10.1145/34623333:1(1-38)Online publication date: 22-Oct-2021
  • (2020)Privacy preserving vertical federated learning for tree-based modelsProceedings of the VLDB Endowment10.14778/3407790.340781113:12(2090-2103)Online publication date: 14-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
February 2001
421 pages
ISBN:3540416587

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 13 February 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Balancing Security and Privacy in Genomic Range QueriesACM Transactions on Privacy and Security10.1145/357579626:3(1-28)Online publication date: 13-Mar-2023
  • (2021)Privacy-aware Character Pattern Matching over Outsourced Encrypted DataDigital Threats: Research and Practice10.1145/34623333:1(1-38)Online publication date: 22-Oct-2021
  • (2020)Privacy preserving vertical federated learning for tree-based modelsProceedings of the VLDB Endowment10.14778/3407790.340781113:12(2090-2103)Online publication date: 14-Sep-2020
  • (2019)A Hybrid Approach to Privacy-Preserving Federated LearningProceedings of the 12th ACM Workshop on Artificial Intelligence and Security10.1145/3338501.3357370(1-11)Online publication date: 11-Nov-2019
  • (2019)Hybrid Private Record LinkageACM Transactions on Privacy and Security10.1145/331846222:3(1-36)Online publication date: 26-Apr-2019
  • (2019)Encrypted LQG using labeled homomorphic encryptionProceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems10.1145/3302509.3311049(129-140)Online publication date: 16-Apr-2019
  • (2019)Privacy-Preserving Truth Discovery in Crowd Sensing SystemsACM Transactions on Sensor Networks10.1145/327750515:1(1-32)Online publication date: 9-Jan-2019
  • (2019)A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud EnvironmentWireless Personal Communications: An International Journal10.1007/s11277-018-6083-9105:2(599-618)Online publication date: 1-Mar-2019
  • (2019)Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingJournal of Cryptology10.1007/s00145-017-9275-732:2(265-323)Online publication date: 1-Apr-2019
  • (2018)A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain ImagesInternational Journal of Digital Crime and Forensics10.4018/IJDCF.201810010910:4(118-139)Online publication date: 1-Oct-2018
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media