Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2010, IEEJ Transactions on Electronics, Information and Systems
This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security requirements of e-voting i.e. privacy, accuracy, universal verifiability, fairness, receipt-freeness, incoercibility, dispute-freeness, robustness, practicality and scalability; usually some of which are found to be traded. When compared with other existing schemes, this scheme requires much more simple computations and weaker assumptions about trustworthiness of individual election authorities. The key mechanism is the one that uses confirmation numbers involved in individual votes to make votes verifiable while disabling all entities including voters themselves to know the linkages between voters and their votes. Many existing e-voting schemes extensively deploy zero-knowledge proof (ZKP) to achieve verifiability. However, ZKP is expensive and complicated. The confirmation numbers attain the verifiability requirement in a much more simple and intuitive way, then the scheme becomes scalable and practical.
2009 IEEE International Conference on Systems, Man and Cybernetics, 2009
This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security requirements of e-voting. The key mechanism is the one that uses confirmation numbers involved in individual votes to make votes verifiable while disabling all entities including voters themselves to know the linkages between voters and their votes. Unlike complicated zero knowledge proof involved in many e-voting schemes, the confirmation numbers attain the verifiability requirement in a much more simple and intuitive way, then the scheme becomes scalable and practical.
Journal of internet services and information security, 2024
The advancement of blockchain technology introduces the new concept of electronic voting systems (e-voting) that are fully anonymous, transparent, trustless, and decentralized. The limitation of blockchain-based e-voting systems is the need for initial setup to verify and validate eligible voters. This initial setup requires human intervention, which curbs the full potential and exploitation of blockchain technology. Identity authentication is crucial in voting systems to ensure the eligibility of the voters and the validity of the results. This paper proposes a hybrid approach using ZK-SNARK for identity authentication systems in blockchain-based e-voting. The proposed hybrid approach aims to maintain the benefit of blockchain technology while guaranteeing the eligibility of voters. Both on-chain and off-chain identity authentication modules are designed and developed to balance the trade-off of centralized and decentralized nature for the blockchain-based e-voting systems. The affordability of the proposed system is essential in justifying the approach's feasibility and usability. Voting systems are expected to host thousands to millions of voters, and the cost is one major consideration. The proposed system is deployed in the Ethereum blockchain network, including its sidechain and Layer 2, i.e., Avalanche, Arbitrum One, and Polygon. The gas fee required for the smart contract deployment in Ethereum is USD12.5, while the lowest gas fee is in the Polygon blockchain network for USD0.02.
The ISC International Journal of Information Security, 2022
Voting is a fundamental mechanism used by many human societies, organizations and nations to make collective decisions. There has been a tremendous effort on making this mechanism fairer, error-free and secure. Electronic voting aims to be a solution to some deficiencies of existing paper-based voting systems. While there have been excellent technical and practical advances in e-voting, and some of them were great in defining the needs and musts of an ideal voting system, there are also severe critics of existing solutions mostly related to end-to-end verifiability and software independence. In this paper, we use blockchain and zero-knowledge proofs for a secure e-voting scheme that satisfies these requirements while preserving the privacy of the voters. We also evaluate our scheme from security and performance aspects. https://www.isecure-journal.com/article_162703.html
Lecture Notes in Computer Science, 2016
Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the election using random factors that will later cancel out and allow the public to verify the tally after the election. While the removal of tallying authorities significantly simplifies election management, the pre-computation of ballots necessitates secure ballot storage, as leakage of precomputed ballots endangers voter privacy. In this paper, we address this problem and propose DRE-ip (DRE-i with enhanced privacy). Adopting a different design strategy, DRE-ip is able to encrypt ballots in real time in such a way that the election tally can be publicly verified without decrypting the cast ballots. As a result, DRE-ip achieves end-to-end verifiability without tallying authorities, similar to DRE-i, but with a significantly stronger guarantee on voter privacy. In the event that the voting machine is fully compromised, the assurance on tallying integrity remains intact and the information leakage is limited to the minimum: only the partial tally at the time of compromise is leaked.
Proceedings of the 2023 ACM Southeast Conference
Secure electronic voting (e-voting) schemes are an imperative topic in today's society as we transition to an increasingly online world. Conventional e-voting processes are centralized that heavily rely on a central aggregator which can raise privacy concerns. Hence, this paper proposes a novel decentralized e-voting scheme that uses the BGW protocol, secure multi-party computation (MPC), and secret sharing as part of a distributed computation mechanism among all the voters to generate a fair and safe e-voting system. Additionally, the proposed scheme provides fully decentralized vote counting, ensures anonymity to further enhance the security of the protocol, and delivers the results of the vote to users. The security of the proposed e-voting scheme is evaluated using prominent security theorems, where the analysis shows that the scheme satisfies several security attributes of secure e-voting, and is more secure and reliable than conventional e-voting protocols.
Computer Science and Software …, 2008
In this paper we have formulated an online voting framework which ensures that the voter is able to vote in a public environment without his vote being eavesdropped on by a neighbor i.e. his vote becomes known to his neighbor or a third party when he marks his choice on a particular candidate. We also give a model for secure online voting system using zero knowledge proof and other cryptographic schemes encompassing the voting process of the user and the backend process of servers and the tallying and display of results and verification by the user of the vote cast by him at a later stage.
Electronic voting provides accuracy and efficiency to the electoral processes. World democracies would benefit from a secure e-voting system not only to improve voter participation and trust but also to prevent electoral fraud. However, current e-voting systems are complex and have security weaknesses. In this paper, we describe a secure e-voting system for national and local elections. This system satisfies the important requirements of an e-voting system through state-of-the-art technologies and secure processes. The system relies on homomorphic cryptography, zero-knowledge proofs, biometrics, smartcards, open source software, and secure computers for securely and efficiently implementing the system processes over the various stages of electoral process. Furthermore, we describe the pilot implementations of this system that test the main technologies and processes used. We explain how the used technologies and processes achieve the system requirement. In conclusion, we recommend adopting this system for its security, flexibility, economic, and scalability features.
Int. J. Netw. Secur., 2018
This paper proposes a new electronic voting (e-voting) scheme that exploits 2 pairs of signatures of signing (election) authorities. One pair of signatures on each voter’s same blinded token enables the voter to appear to authorities in consecutive election stages anonymously. Another pair of signatures on each voter’s same blinded vote enables authorities to protect them from the voter’s dishonesties. Namely, while a vote remains same within its 2 different signed forms, the voter cannot claim that her vote is disrupted by other entities while intentionally submitting a meaningless or invalid vote. The scheme is suitable for small community where the number of voters is not very high. Here for vote construction, Hwang et al.’s untraceable blind signature (BS) scheme is exploited. Thereby no mutually independent signing authority involved in the scheme is able to link the resulting vote-signature pair even when the signature is publicly revealed. When compared with existing schemes,...
International Journal of Swarm Intelligence and Evolutionary Computation, 2017
The main challenge in electronic voting (EV) systems is the security issue which has gained an interest of researchers in the last twenty years. EV system is one of the most important Internet-related activities. Recently many countries moved to electronic voting instead of a traditional one for many reason. Electronic voting has been studied for over the last twenty years. Until now, many EV schemes have been proposed. However, there is no a complete solution in both theoretical and practical areas. So, the researchers try to preserve the cryptographic primitives to build e-voting schemes with high efficiency to achieve these requirements. In this paper, we present a new cryptographic verifiable voting system. The digital signature represents one of the most important applications of cryptographic protocols In order to implement the cryptographic protocols in the field EV systems, it is important to secure the communication channels to the legal users. Therefore, the main target of this paper is to design a scheme which is more effective and achieving higher security properties based on bit commitment infrastructure and digital signature technology. In this system, the improper behavior of the voter will be detected and invalid or double votes will not be taken into account. In addition, the voter has the ability to prove that his vote is in correct form without disclosing any other information about his vote and his decision.
— The paper we present is an e-voting system that uses the Homomorphic encryption to ensure anonymity, privacy, and security in the voting. It is able to perform calculations on the encrypted data itself and also encrypting the output of the operation automatically. For this reason, it is being used in applications that include secure multi-party computation, encryption of data, electronic voting, etc. Homomorphic encryption comes under privacy homomorphism. In this paper, we implement the homomorphic encryption mechanism to design an electronic voting system that has the feature or ability to keep separated the privileges among voters, candidates, and announcers. The experimental results show the application ensures anonymity in voting and also prevents cheating during the counting process, this also reduces the overhead of continuous encryption and decryption of the data which is present in the current encryption scenario thereby reducing the time-complexity of the algorithm. The application will use Two-Factor Authentication for validating the authenticity of the users, the application developed can be migrated easily between different DBMS and the application developed will be responsive and will offer rich User Experience while accessing the application on mobile and tablet devices.
Computer Standards & Interfaces, 2003
An electronic voting system makes it possible for the voters to cast their ballots over the computer network. Hence, voters 11 can participate in elections without having to go to the polling places, which is more convenient and efficient. To design a 12 practical voting scheme, Mu and Varadharajan have recently proposed an anonymous secure electronic voting scheme to be 13 applied over the network. It does not only protect voters' privacy and prevent double voting, but also suits large-scale elections. 14 However, the scheme has a weakness in security; that is, some voters may still double vote without being detected and may 15 even reveal information they should not. In this paper, we shall show this weakness and improve the scheme to increase the 16 protection against fraudulence. 17 D 2002 Published by Elsevier Science B.V. 18 19 23
Proceedings of the 9th Joint Conference on Information Sciences (JCIS), 2006
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditional paper-based voting activities in some developed countries. A secure anonymous e-voting system has to satisfy many properties, such as completeness, tally correctness, and uncoercibility, where the uncoercibility property is the most difficult one to be achieved. Since each voter can obtain a voting receipt in an electronic voting system, coercibility and bribe (vote-buying and vote-selling are included) become more and more serious in electronic voting environments than traditional paper-based voting environments. Unfortunately, most of the solutions, like receipt-freeness or untappable channels, proposed in the literature, are impractical owing to lack of efficiency or too complicated to be implemented. It will make uncoercible e-voting systems unacceptable by the people. In order to cope with the drawbacks of the previous schemes, this paper will present a generic idea, which is independent of the underlying cryptographic components, on electronic voting to achieve the uncoercibility property and other requirements. The proposed method is an efficient and quite practical solution to match the current environments of electronic voting.
IEEE CSF, 2020
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of authorities are corrupt. For verifiability, stronger security is demanded. Typically, corrupt authorities that try to fake the tally result must always be detected. To provide verifiability, many e-voting protocols use Non-Interactive Zero-Knowledge proofs (NIZK). Thanks to their non-interactive nature, NIZK allow anybody, including third parties that do not participate in the protocol, to verify the correctness of the tally. Therefore, NIZK can be used to obtain universal verifiability. Additionally, NIZK also improve usability because they allow voters to cast a vote non-interactively. The disadvantage of NIZK is that their security is based on setup assumptions such as the common reference string (CRS) or the random oracle model. The former requires a trusted party to generate a CRS. The latter, though a popular model for secure protocol design, has been shown to be unsound. We address the design of e-voting protocols that provide verifiability without any trust assumptions. We show that Non-Interactive Witness-Indistinguishable proofs can be used for this purpose. Our e-voting protocols are private under the Decision Linear assumption, while perfect individual verifiability, i.e. a fake tally is detected with probability 1, holds unconditionally. Perfect universal verifiability requires a trusted public bulletin board. We remark that our definition of verifiability does not consider eligibility or end-to-end verifiability. First, we present a general construction that supports any tally function. Then, we show how to efficiently instantiate it for specific types of elections through Groth-Sahai proofs.
2023
Traditional voting systems mainly comprise of paper polling, electronic ballot system (EVM), mechanical devices, etc., and demand the physical presence of the voters. In the new age of digitization, the electronic voting system has come up with a unique facility to cast votes from any discreet place. However, the e-voting system has to face several challenges regarding security and privacy. To overcome such obstructions, blockchain is introduced in e-voting applications that preserve anonymity, security, and consistency of voter-related information with the help of Merkle tree and hash digest. Hence, any discrepancy can immediately be detected whenever the hash values of the respective block have been modified and consequently, the whole block is discarded. In this research, a novel e-voting scheme is proposed following the decentralized service-oriented architecture of Exonum private blockchain, hybrid consensus algorithm, and Elliptic Curve Diffie-Helmen (ECDH) protocol to agree upon a secure session key among different participants. Moreover, the proposed scheme (ECC-EXONUM-eVOTING) employs a zero-knowledge protocol and is customized to work over idemix technologies with a blind signature scheme. Numerous well-known cryptographic attacks are analyzed formally using the probabilistic random oracle model and informally for validating the security strength of ECC-EXONUM-eVOTING. As a result, it is found that the proposed scheme is well-defended against all potential security concerns. Furthermore, the scheme is simulated using both Automated Validation of Internet Security Protocols and Applications (AVISPA) and Scyther tools to demonstrate the proposed scheme is not prone to any security attacks. Finally, it is concluded that the proposed scheme is well-suited for secure e-voting applications. INDEX TERMS Distributed Ledger Technology (DLT), Elliptic Curve Discrete Logarithm Problem (ECDLP), Practical Byzantine Fault Tolerant (PBFT). B LOCKCHAIN technology was first invented and used as a peer-to-peer payment system using Bitcoin by Mr. Satoshi Nakamoto in 2008 [1, 2]. Then, it this concept is incorporated into various applications such as digital voting, health care applications, e-voting systems, etc. [2-4]. Fundamentally, blockchain is a type of Distributed Ledger Technology (DLT) that follows a decentralized, permissionless, distributed ledger for a public blockchain and a permissionintegrated, decentralized, or distributed ledger for private
We present an improvement of Ohkubo et al.'s e-voting protocol [OMA + 99]: We provide that the validator's signature is attached directly to the vote although the vote has been encrypted before. Thus verifiability does not end before tallying like in the original scheme but is pervasive even beyond the end of the election. This prevents manipulation of the plaintext votes and offers verifiability to the public instead of restricting it to the talliers. Moreover, privacy can be ensured without using blind signatures, which facilitates receipt-freeness. Our variant of the scheme also allows the voter to seemingly comply with the demand of a coercer while actually casting the vote she intended.
arXiv (Cornell University), 2022
Current methods of voter identification, especially in India, are highly primitive and error-prone, depending on verification by (mostly) sight, by highly trusted election officials. This paper attempts to provide a trustless and zero-knowledge method of voter identification, while simultaneously reducing error. It also proposes a method for vote verification, that is, ensuring that the vote cast by a legal voter is registered as cast and tallied as registered. While numerous methods of zero-knowledge identification are available in the literature, very few of those are implementable on a large scale and subject to the type of constraints that are present, eg., in India. This paper attempts to provide a solution which, while preserving the integrity of the available methods, will also be more scalable and cost-effective.
The Second International Conference on Availability, Reliability and Security (ARES'07), 2007
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, individual verifiability, and universal verifiability. Unlike existing e-voting protocols we employ dynamic ballot instead of predefined usual ballot in order to strengthen accuracy and fairness of the protocol. In dynamic ballots, the ordering of candidates in the ballots is dynamically created and changes for each voter. Therefore the proposed protocol is called as "DynaVote". DynaVote does not use complex cryptographic algorithms such as homomorphic encryption and does not require anonymous communication channels such as mix-nets since it employs PVID (Pseudo-Voter Identity) scheme which relies on blind signature. Besides it has no physical assumption such as untappable channels. Hence, DynaVote is a practical e-voting protocol for large scale elections. DynaVote is performed over a network such as the Internet. In order to achieve uncoercibility, DynaVote allows recasting without sacrificing uniqueness.
Information Security for Global Information Infrastructures, 2000
This paper describes a new receipt-free electronic voting system for an open network. In our system, the voters vote with anonymous voting passes, which is motivated by the E-Cash protocol [1]. We have modified the E-Cash protocol such that the pass is non-transferable. A modified commitment scheme is also employed so that the administrator cannot change the vote even if it knows the content of the ballot. Our system is designed for realising the digitalization of large-scale elections conducted by the government. Various aspects involved in an election are considered during protocol design so that the potential cheats of either the voters or the administrators are prevented.
2019
This document describes the principles for building an anonymous decentralized e-voting system. It is proposed to use a ring signature mechanism to ensure anonymity of voters and blockchain technology to ensure the integrity and transparency of the transaction history. Thus, it can be beneficial to use such a combination to ensure the maximal robustness of the systems in the realworld conditions with the persistence of a potential malefactor that is interested to disrupt the work of the system, change the data in some way or influence the processes that are happening inside of the system.
Computer Science Review, 2013
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote cannot be traced back from the result to a voter, while on the other hand, verifiability states that a voter can trace the effect of her vote on the result. This can be addressed using various privacy-enabling cryptographic primitives which also offer verifiability.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.