A Practical Electronic Voting Protocol Using Threshold Schemes
نویسندگان
چکیده
This paper presents a novel secret voting scheme which fully conforms to the requirements of large scale elections. The participants in the scheme are voters, candidates, an administrator, and a counter. The scheme uses threshold encryption to preserve the privacy and accuracy of the votes against dishonesty of voters, candidates, the administrator , and the counter. It also ensures veriiability, fairness, and soundness of the voting process and hence neither administrator nor candidates, or the counter is capable of producing false tally, aaecting the voting result, or corrupting/disrupting the election.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAn Electronic Voting Scheme through Blind Signature
Many e-voting schemes have been proposed in the literature. However, none of them is both secure and practical. In this paper, a practical and secure electronic voting protocol for large-scale voting over the Internet is investigated. Blind signature is applied to a voter's ballot making it impossible for anyone to trace the ballot back to the voter. Unlike previous blind signature based scheme...
متن کاملTowards a Practical, Secure, and Very Large Scale Online Election
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has never been put together in a single protocol before. Among all electronic voting schemes in the literature, Sensus, a security-conscious electronic voting protocol proposed by Cranor and Cytron [CC97], satisfies the most o...
متن کاملAn Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions
In most of the anonymous electronic voting schemes presented in the literature, every voter must decide his intention for a voting before the tally center performs the signing operation on his vote. In these schemes, voters cannot modify or update their intentions embedded in the signed votes even if they have not been sent to the tally center for tallying yet. This paper presents a new anonymo...
متن کاملWhy Public Registration Boards are Required in E-Voting Systems Based on Threshold Blind Signature Protocols
In this paper, we demonstrate that e-voting protocols based on threshold blind signatures from multiple authorities allow a coalition of eligible voters to cast more than votes. This property presents a serious violation of the principles of democracy in the voting process. We analyze the applicability of this violation and provide a generic solution using a public registration board and modifi...
متن کامل