Anonymity in E-voting Protocols

نویسندگان

  • Orhan Çetinkaya
  • Deniz Çetinkaya
چکیده

Voter anonymity, also known as unlinkability, is the basic requirement in order to satisfy privacy in electronic voting (e-voting) protocols, which means that a particular vote is not linkable to any voter. In other words, the relationship between voter identity and the related cast vote should be private to that particular voter and it should not be revealed or proved in any way. Many e-voting protocols have been proposed from both theoretical and practical perspectives in the last decades. This paper focuses on the anonymity properties of some previously proposed e-voting protocols and classifies the e-voting protocols by their privacy preserving approaches as: (a) protocols based on anonymous channel, (b) protocols based on homomorphic encryption and (c) other protocols. Then, main features and characteristics of these approaches are pointed out and feasibility of performing practical and secure e-voting is discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Receipt-Freeness as a Special Case of Anonymity in Epistemic Logic?

Formal methods have provided us with tools to check both anonymity of protocols and – more specifically – receipt-freeness of voting protocols. One of the frameworks used for proving anonymity is epistemic logic. However, to the best of our knowledge, epistemic logic has never been used to prove receipt-freeness of voting protocols. Still, the concept of indistinguishability used in formalizing...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Automated Anonymity Verification of the ThreeBallot Voting System

In recent years, a large number of secure voting protocols have been proposed in the literature. Often these protocols contain flaws, but because they are complex protocols, rigorous formal analysis has proven hard to come by. Rivest’s ThreeBallot voting system is important because it aims to provide security (voter anonymity and voter verifiability) without requiring cryptography. In this pape...

متن کامل

Anonymity and CSP for Voting Systems

In this paper, we present a concise formal definition of anonymity for voting protocols using process algebra Communicating Sequential Processes (CSP). We analyse a number of anonymity definitions and give the formal definitions for the strong and weak anonymity highlighting the difference between them. It shows us that the strong anonymity definition is not an appropriate definition as it is t...

متن کامل

Existential Assertions for Voting Protocols

In [22], we extend the Dolev-Yao model with assertions. We build on that work and add existential abstraction to the language, which allows us to translate common constructs used in voting protocols into proof properties. We also give an equivalencebased definition of anonymity in this model, and prove anonymity for the FOO voting protocol.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007