An Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation
نویسندگان
چکیده
E-voting systems (EVS)are having potential advantages over many existing voting schemes. Security, transparency, accuracy and reliability are the major concern in these systems. EVS continues to grow as the technology advances. It is inexpensive and efficient as the resources become reusable. Fast and accurate computation of results with voter privacy is the added advantage. In the proposed system we make use of secret sharing technique and secure multi party computation (SMC) to achieve security and reliability. SMC is a field of cryptography which create methods that enable parties to compute joint function over their private inputs preserving the privacy and correctness. Secret sharing is an important technique used for SMC. Multi-party computation is typically accomplished using secret sharing by making shares of the inputs and manipulating the shares to compute a typical function of the input. The proposed system make use of bitwise representation of votes and only the shares are used for transmission and computation of result. Secure sum evaluation can be done with shares distributed using Shamir’s secret sharing scheme. The scheme is hence secure and reliable and does not make any number theoretic assumptions for security. We also propose a unique method which calculates the candidates individual votes without revealing the anonymity.
منابع مشابه
Secret Sharing Homomorphism and Secure E-voting
Secure E-voting is a challenging protocol.Several approaches based on homomorphic crypto systems, mix-nets blind signatures are proposed in the literature.But most of them need complicated homomorphic encryption which involves complicated encryption decryption process and key management which is not efficient.In this paper we propose a secure and efficient E-voting scheme based on secret sharin...
متن کاملUnconditionally Secure Multiparty Computation and Secret Sharing
We suggest protocols for secure computation of the sum, product, and some other functions of three or more elements of an arbitrary constructible ring, without using any one-way functions. A new input that we offer here is that, in contrast with other proposals, we conceal “intermediate results” of a computation, i.e., we do not let any party accumulate functions of other parties’ private numbe...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملA Novel Threshold Secret Sharing Scheme Using FFT Algorithm
Secret sharing schemes (SSS) are very important, because they are used in critical applications such as e-voting, cryptographic key distribution and sharing, secure online auctions, information hiding, and secure multiparty computation. We explained some popular algorithms of secret sharing such as threshold, graph, and visual schemes and their access structures. Besides, we discussed the limit...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1502.07469 شماره
صفحات -
تاریخ انتشار 2014