Design for Enhanced Security and Convenience of E - Voting Scheme
نویسنده
چکیده
The popularity of Internet has altered the traditional way of life and behavioral patterns. Indeed, while the Internet has brought great convenience, it has also highlighted numerous issues for network security. Many countries are committed to the development of e-voting, which would help societies reduce the amount of resources allocated for traditional elections. However, most literatures exploring the signature mechanisms of electronic elections only address research and technology pertaining to the single voting scheme and single blind signature mechanism. Further, these electoral processes typically exploit only blind signature rather than encryption. In the case where multiple votes are cast simultaneously by a single voter, thereby requiring various ballots to be signed electronically, both the processing speed of the server as well as the security of the ballots would be greatly compromised. This study thus examines the mechanism that would accord a more efficient and secure design for the e-voting system, which would also take into account the immediacy of proxy voting as well as the need to ensure voters’ anonymity. This research focuses on the implementation of the Elliptic Curve Cryptosystem and its capacity to generate computations rapidly as its foundation. The properties of blind signature and proxy signature in proxy blind signature are engaged to facilitate the signcyrption of multiple ballots simultaneously. It further harnessed the avalanche effect in the design of encryption to increase the difficulty of deciphering ciphertext. In all, these designs, which enhance the overall efficiency and security of the e-voting system, would be applicable to an e-voting mechanism that features multiple and varied polls in the future.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملA Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol
Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore, convenience and mobility make electronic voting become more and more popular and electronic voting ca...
متن کاملDesign and Analysis of a Practical E-Voting Protocol
In this paper we design an e-voting protocol for an academic voting system which should be independent from other university applications. We briefly discuss security requirements for e-voting schemes focusing on our proposed scheme. We design a receipt-free e-voting protocol which requires neither anonymous channel nor other physical assumptions. We give a short survey on formal analysis of e-...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملBuilding Secure Elections: E-Voting, Security, and Systems Theory
The increased use of information technology promises to revolutionize both the provision of government services and the vibrancy of democracy. In the aftermath of the Florida voting controversy during the 2000 presidential election, governments have placed their faith in technology, adopting e-voting machines that offer enhanced voter convenience and eliminate the need for subjective recounts. ...
متن کامل