3 research outputs found

    A two authorities electronic vote scheme

    Full text link
    [EN] In this paper we propose a new electronic multi-authority voting system based on blind signatures. We focus on the open problem of the efficiency of electronic voting systems. Most of the proposed systems rely on complex architectures or expensive proofs, in this work we aim to reduce the time-complexity of the voting process, both for the voter and the authorities involved. Our system is focused on simplicity and it is based on the assumption of two unrelated entities. This simplicity makes our approach scalable and flexible to multiple kinds of elections. We propose a method that limits the number of authorities to only 2 of them; we reduce the overall number of modular operations; and, propose a method which cut downs the interactions needed to cast a vote. The result is a voting protocol whose complexity scales linearly with the number of votes.Larriba-Flor, AM.; Sempere Luna, JM.; López Rodríguez, D. (2020). A two authorities electronic vote scheme. Computers & Security. 97:1-12. https://doi.org/10.1016/j.cose.2020.101940S11297Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422-426. doi:10.1145/362686.362692Brams S., Fishburn P.C.. 2007. Approval voting Springer ScienceCarroll, T. E., & Grosu, D. (2009). A secure and anonymous voter-controlled election scheme. Journal of Network and Computer Applications, 32(3), 599-606. doi:10.1016/j.jnca.2008.07.010Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-90. doi:10.1145/358549.358563Cramer, R., Gennaro, R., & Schoenmakers, B. (1997). A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications, 8(5), 481-490. doi:10.1002/ett.4460080506Desmedt, Y. G. (2010). Threshold cryptography. European Transactions on Telecommunications, 5(4), 449-458. doi:10.1002/ett.4460050407Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469-472. doi:10.1109/tit.1985.1057074Juang, W.-S. (2002). A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. The Computer Journal, 45(6), 672-682. doi:10.1093/comjnl/45.6.672Menezes A., van Oorschot P.C., Vanstone S.A.. 1996. Handbook of Applied Cryptography.Parhami, B. (1994). Voting algorithms. IEEE Transactions on Reliability, 43(4), 617-629. doi:10.1109/24.370218Rabin, M. O. (1980). Probabilistic Algorithms in Finite Fields. SIAM Journal on Computing, 9(2), 273-280. doi:10.1137/0209024Rabin, M. O. (1983). Transaction protection by beacons. Journal of Computer and System Sciences, 27(2), 256-267. doi:10.1016/0022-0000(83)90042-9Salazar, J. L., Piles, J. J., Ruiz-Mas, J., & Moreno-Jiménez, J. M. (2010). Security approaches in e-cognocracy. Computer Standards & Interfaces, 32(5-6), 256-265. doi:10.1016/j.csi.2010.01.004Nguyen, T. A. T., & Dang, T. K. (2013). Enhanced security in internet voting protocol using blind signature and dynamic ballots. Electronic Commerce Research, 13(3), 257-272. doi:10.1007/s10660-013-9120-5Wu, Z.-Y., Wu, J.-C., Lin, S.-C., & Wang, C. (2014). An electronic voting mechanism for fighting bribery and coercion. Journal of Network and Computer Applications, 40, 139-150. doi:10.1016/j.jnca.2013.09.011Yang, X., Yi, X., Nepal, S., Kelarev, A., & Han, F. (2018). A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption. IEEE Access, 6, 20506-20519. doi:10.1109/access.2018.2817518Yi, X., & Okamoto, E. (2013). Practical Internet voting system. Journal of Network and Computer Applications, 36(1), 378-387. doi:10.1016/j.jnca.2012.05.00

    Conceptualization of a Blockchain Based Voting Ecosystem in Estonia

    Get PDF
    Demokraatia on iidsete kreeklaste poolt vĂ€lja töötatud mĂ”iste, mille tĂ€hendus on "inimeste valitsemine". Maailm on arenenud sellest ajast kaugele edasi – impeeriumidest kuningriikideni ning lĂ”puks jĂ”udnud demokraatiani nagu me seda tĂ€napĂ€eval teame. Praegustes demokraatlikes riikides pĂ”hineb rahva poolne juhtimine perioodilistel valimistel, mis viiakse lĂ€bi otsese vĂ”i kaudse hÀÀletamise teel. HÀÀletamisviisid on olnud kuni 20. sajandini ĂŒhtsed, kasutades hÀÀletamissedeleid ja fĂŒĂŒsilist loendamist. Tehnoloogia ja tehnika on sellest ajast alates olukorda muutnud, juurutades elektroonilised hÀÀletamismasinad, nĂ€iteks Indias, ja elektroonilised hÀÀletamisvĂ”imalused Interneti kaudu, nagu nĂ€iteks Eestis, mida kasutatakse jĂ€rjepidevalt. Kuid kĂ”ige selle juures jÀÀb midagi ikkagi lahendamata. Peale kandidaatide vĂ”i valitsuse valimist vĂ”ivad ja saavad nad oma kohustusi ja ĂŒlesandeid tĂ€ita ebapiisava korrektsuse, vĂ€hese vĂ”i puuduva vastutuse ning jĂ€relevalveta. Isegi pĂ€rast valimisi vĂ”ib valitsus olla oma kodanike seas ebapopulaarne, kuid enne jĂ€rgmisi valimisi ei ole kodanikel vĂ”imalust midagi muuta. See vĂ€itekiri aitab selle lĂŒnga tĂ€ita vĂ€rskelt kasutusele vĂ”etud plokiahela ja hajusraamatu tehnoloogia kasutamisega ning ka Ă€sja vĂ€ljatöötatud uuenduslike kontseptsioonide abil.Democracy is an age-old concept coined by the ancient Greeks meaning, ‘Rule by People’. World has come far from that, from empires, to kingdoms to finally democracy as we know it. In current democracies, the exercise conducted to be ‘Ruled by People’ is based up on periodic elections and those elections are conducted via voting, direct or indirect. The ways of voting have been consistent up until the 20th Century with the use of ballot papers and physical counting. The age of technology and engineering since, have brought about changes to the status quo, with introduction of Electronic Voting Machines such as, in India and Electronic Voting via Internet such as, in Estonia which are practiced in every election. But in all of this, something still remains unresolved. When candidates or in turn a government is elected, they are meagre obliged to perform their duties correctly, with little or no accountability and oversight. Even after elections, a government might be unpopular among its citizens, but the citizens don’t have means to change anything, before the next elections. This thesis helps to fill this gap with use of newly introduced technology of Blockchain and Distributed Ledgers, and also with the help of newly conceptualized innovative concepts

    An electronic voting mechanism for fighting bribery and coercion.

    No full text
    [[abstract]]This paper proposes an electronic voting scheme that can be implemented on the current Internet without any secure channel. Under the long-term private key assumption, this scheme not only satisfies most important security requirements proposed before, such as fairness, eligibility, uniqueness, accuracy, anonymity and so on, but also prevents bribery and coercion. Furthermore, the scheme offers voters mobility and convenience so they can securely and easily cast their vote from any location and on any device using a stable Internet connection, which has a potential for raising voter turnout rates and facilitating the voting process.[[notice]]èŁœæ­ŁćźŒ
    corecore