Commit 6b320cd4 authored by Stephane Glondu's avatar Stephane Glondu
Browse files

David's comments on spec (no code changes)

parent 8d56da59
......@@ -46,7 +46,8 @@ available online.\footnote{\url{}}
The Belenios protocol is very similar to Helios (with a signature
added to ballots and different zero-knowledge proofs) and Helios-C
(without distributed key generation of trustees).
(with the distributed key generation of trustees of Helios, without
threshold support).
The cryptography involved in Belenios needs a cyclic group $\G$ where
discrete logarithms are hard to compute. We will denote by $g$ a
......@@ -71,6 +72,7 @@ section~\ref{default-group} (they are the same as Helios v3).
\subsection{Election setup}
\item $A$ generates a fresh \hyperref[basic-types]{$\uuid$} $u$ and
......@@ -83,11 +85,11 @@ section~\ref{default-group} (they are the same as Helios v3).
\item $C$ forgets the mapping between $j$ and $\public(c_j)$
if credential recovery is not needed
\item $C$ sends $L$ to $A$
\item for $i\in[1\dots m]$,
\item for $z\in[1\dots m]$,
\item $T_i$ generates a \hyperref[trustee-keys]{$\tpk$} $k_i$ and
\item $T_z$ generates a \hyperref[trustee-keys]{$\tpk$} $k_z$ and
sends it to $A$
\item $A$ checks $k_i$
\item $A$ checks $k_z$
\item $A$ combines all the trustee public keys into the election
public key $y$
......@@ -100,7 +102,7 @@ section~\ref{default-group} (they are the same as Helios v3).
\item $V$ gets $E$
\item $V$ creates a \hyperref[ballots]{$\ballot$} $b$ and submits it to $S$
\item $S$ verifies $b$ and publishes it
\item $S$ validates $b$ and publishes it
\subsection{Credential recovery}
......@@ -119,12 +121,12 @@ section~\ref{default-group} (they are the same as Helios v3).
\item $A$ stops $S$ and computes the \hyperref[tally]{$\etally$} $\Pi$
\item for $i\in[1\dots m]$,
\item for $z\in[1\dots m]$,
\item $A$ sends $\Pi$ to $T_i$
\item $T_i$ generates a \hyperref[tally]{$\pdecryption$} $\delta_i$
\item $A$ sends $\Pi$ to $T_z$
\item $T_z$ generates a \hyperref[tally]{$\pdecryption$} $\delta_z$
and sends it to $A$
\item $A$ verifies $\delta_i$
\item $A$ verifies $\delta_z$
\item $A$ combines all the partial decryptions, computes and publishes
the election \hyperref[election-result]{\result}
......@@ -295,6 +297,14 @@ trustees, and bundled with the group parameters in a
During an election, public data include:
\item the $\election$ structure described above;
\item all the $\tpk$s that were generated during the
\hyperref[election-setup]{setup phase};
\item the set $L$ of public credentials.
\subsection{Disjunctive proofs}
......@@ -318,13 +328,13 @@ following procedure, parameterised by a group element $S$:
\item pick a random $w\in\Z_q$
\item compute $A_i=g^w$ and $B_i=y^w$
\item $\challenge(\pi_i)=\Hash_\dprove(S,A_0,B_0,\dots,A_k,B_k)-\sum_{j\neq
\item $\challenge(\pi_i)=\Hash_\dprove(S,\alpha,\beta,A_0,B_0,\dots,A_k,B_k)-\sum_{j\neq
i}\challenge(\pi_j)\mod q$
\item $\response(\pi_i)=w+r\times\challenge(\pi_i)\mod q$
In the above, $\Hash_\dprove$ is computed as follows:
where \verb=prove=, the vertical bars and the commas are verbatim and
numbers are written in base 10. The result is interpreted as a 256-bit
big-endian number. We will denote the whole procedure by
......@@ -336,7 +346,7 @@ The proof is verified as follows:
\item check that
k]}\challenge(\pi_j)\mod q\]
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment