A practical multi-party computation algorithm for a secure distributed online voting system
نویسنده
چکیده
We present an online voting architecture based on partitioning the election in small clusters of voters and using a new Multi-party Computation algorithm for obtaining voting results from the clusters. This new algorithm has some practical advantages over other previously known algorithms and isn’t bound to any specific cryptographic concept; so it can be adapted to future cryptographic exigencies. Compared with other online voting technologies, we see that this new architecture is less vulnerable to hacker attacks and attacks from dishonest authorities, given that no sensitive information is stored in any public server and there is no need for any trustee to safeguard the legality of the election process. Even in case of an attack succeeding, the risks associated with the overall election are far lower than with any other voting system. This architecture can also be combined with any other voting system, inheriting advantages from both systems.
منابع مشابه
An Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation
E-voting systems (EVS)are having potential advantages over many existing voting schemes. Security, transparency, accuracy and reliability are the major concern in these systems. EVS continues to grow as the technology advances. It is inexpensive and efficient as the resources become reusable. Fast and accurate computation of results with voter privacy is the added advantage. In the proposed sys...
متن کاملDistributed Paillier Plaintext Equivalence Test
Consider the following scenario with N +2 parties, A, B, X1, X2, · · · , XN . Party A has a secret a, party B has a secret b, and party Xi has a secret xi, for i = 1, · · · , N . They want to know if a = b without revealing any information about their secrets. We propose a distributed protocol for this problem based on the Paillier threshold homomorphic encryption scheme with a public broadcast...
متن کاملPractical and Deployable Secure Multi-Party Computation
Practical and Deployable Secure Multi-Party Computation
متن کاملEfficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games
There are many wonderful protocols in cryptography which are still waiting for their realization. Here we consider efficient solutions for secure electronic card games. Our contribution seems to be the first known practical implementation that requires no trusted third-party and simultaneously keeps the players’ strategies confidential. The provided open source library LibTMCG can be used for c...
متن کاملA Novel Approach For Privacy Preserving Videosharing And Merging
In present days rapid growth of internet has paved a path for increased utilization of distributed applications. The number of applications aredrastically increased for a distribution of video information to various places. In recent years, videos are also playingmajor role at various surveillance applications. Hence, propose a novel approach to share the videos to various places while providin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1603.04228 شماره
صفحات -
تاریخ انتشار 2016