A Practical Privacy Preserving E-Voting Protocol Using Dynamic Ballots
نویسندگان
چکیده
We describe a practical e-voting protocol which guarantees e-voting protocol requirements: eligibility, privacy, accuracy, fairness, receipt-freeness, uncoercibility, robustness and verifiability. Unlike existing blind signature based protocols, in which the authority blindly signs ballot or part of ballot, the authority in our protocol blindly signs voter’s pseudo identity. Hereafter, voter becomes ”Pseudo Voter” and uses this pseudo identity for further steps. Instead of pre-defined static ballots, the order of candidates in the ballots are dynamically created and change for each voter. So, it is called as ”Dynamic Ballot”. Both dynamic ballot and pseudo voter identity is used in order to possess the strong property of voter privacy and fairness and to solve blind signature based protocols’ problems: voter abstention and more voter involvement.
منابع مشابه
Receipt-Free Homomorphic Elections and Write-in Ballots
Abstract. We present a voting protocol that protects voters’ privacy and achieves universal verifiability, receipt-freeness, and uncoercibility without ad hoc physical assumptions or procedural constraints (such as untappable channels, voting booths, smart cards, third-party randomizers, and so on). We discuss under which conditions the scheme allows voters to cast write-in ballots, and we show...
متن کاملPractical Aspects of DynaVote e-Voting Protocol
Voting is regarded as one of the most effective methods for individuals to express their opinions on a given topic. Electronic voting (e-Voting) refers to the use of computers or computerised voting equipments to cast ballots in an election. e-Voting performed over Internet can be universally accepted in the upcoming years due to the fact that Internet plays a key role in people’s lives. The Dy...
متن کاملDRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the election using random factors that will later cancel out and allow the public to verify the tally after the election. While the removal of tallying authorities significantly si...
متن کاملPractical Attacks on Cryptographically End-to-end Verifiable Internet Voting Systems
Cryptographic end-to-end verifiable voting technologies concern themselves with the provision of a more trustworthy, transparent, and robust elections. To provide voting systems with more transparency and accountability throughout the process while preserving privacy which allows voters to express their true intent. Helios Voting is one of these systems—an online platform where anyone can easil...
متن کاملEvery Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting
This paper presents a new End-to-End (E2E) verifiable e-voting protocol for large-scale elections, called Direct Recording Electronic with Integrity (DRE-i). In contrast to all other E2E verifiable voting schemes, ours does not involve any Tallying Authorities (TAs). The design of DRE-i is based on the hypothesis that existing E2E voting protocols’ universal dependence on TAs is a key obstacle ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006