Double voter perceptible blind signature based electronic voting protocol

Authors

Abstract:

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this paper, getting Asadpour et al.'s scheme as one of the latest ones and showing its weaknesses, we propose a new voting scheme which is immune to the weaknesses of previous schemes without losing efficiency. The scheme, is based on a special structure, which directly uses the identity of the voter, hides it in that structure and reveals it after double voting. We also, show that the security of this scheme depends on hardness of RSA cryptosystem, Discrete Logarithm problem and Representation problem.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Double Voter Perceptible Blind Signature Based Electronic Voting Protocol

Mu et al. proposed an electronic voting protocol and claimed that it protects voter’s anonymity, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter’s privacy and prevent double voting. After that several improvement have been presented on it which suffer from the same weaknesses. One of the latest improvement on it, relates to Rodriguez-Hen...

full text

An Electronic Voting Scheme through Blind Signature

Many e-voting schemes have been proposed in the literature. However, none of them is both secure and practical. In this paper, a practical and secure electronic voting protocol for large-scale voting over the Internet is investigated. Blind signature is applied to a voter's ballot making it impossible for anyone to trace the ballot back to the voter. Unlike previous blind signature based scheme...

full text

Electronic Voting Protocols Based on Blind Signatures

In this paper, we review the electronic voting protocols based on blind signature scheme. These protocols try to fulfil the following electronic voting requirements: eligibility, privacy, receipt-freeness, fairness, accuracy, individual verifiability and universal verifiability. Some of them like eligibility and privacy are easily achieved by the nature of blind signatures; on the other hand, s...

full text

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

full text

Electronic Voting Protocol Using Identity-Based Cryptography

Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. ...

full text

Blind Collective Signature Protocol

Using the digital signature (DS) scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implem...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 3  issue 1

pages  43- 50

publication date 2011-01-15

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023