A Novel Approach to E-voting with Group Identity-based Identification and Homomorphic Encryption Scheme

被引:0
|
作者
Vangujar A.K. [1 ]
Ganesh B. [1 ]
Umrani A. [1 ]
Palmieri P. [1 ]
机构
[1] School of Computer Science and IT, University College Cork
来源
IEEE Access | / 162825-162843期
关键词
Discrete Logarithmic Assumption; Distributed ElGamal; E-voting; Electronic voting; ElGamal; Group Identity-based Identification; Homomorphic Encryption; Homomorphic encryption; Identity-based Identification; Privacy; Protocols; Public key; Security; Standards;
D O I
10.1109/ACCESS.2024.3408670
中图分类号
学科分类号
摘要
This article presents a novel e-voting scheme that combines Group Identity-based Identification (GIBI) with Homomorphic Encryption (HE) based on the discrete logarithmic assumption. The proposed scheme uses the Schnorr-like GIBI scheme for voter identification and authorization using zero-knowledge proofs to ensure the <italic>anonymity</italic> and <italic>eligibility</italic> of voters. The voter v<italic>i,j</italic> is granted the authorization to cast a valid vote for a single candidate C<italic>k</italic>. The use of distributed ElGamal provides <italic>fairness</italic> while the use of partial shares for decryption enables <italic>individual</italic> and <italic>universal verifiability</italic> without the need for a central authority. The proposed scheme is secure under various scenarios and <italic>robust</italic> in the random oracle model. The GIBI-HE scheme offers a promising solution for e-voting, providing a sustainable and accessible environment for voters while supporting the <italic>unreusability</italic> of votes and protecting the <italic>privacy</italic> of voters. Authors
引用
收藏
页码:1 / 1
相关论文
共 50 条
  • [41] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [42] A New E-Voting Scheme Based on Improved DLP
    Yang Huaiqing
    Wang Shaobin
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 607 - 610
  • [43] A Mobile Biometric-Based E-voting Scheme
    Alrodhan, Waleed A.
    Alturbaq, Ali
    Aldahlawi, Saud
    2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [44] Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption
    Agrawal, Aniket
    Sethi, Kamalakanta
    Bera, Padmalochan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 411 - 436
  • [45] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [46] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [47] Identity-based searchable encryption scheme with a designated tester
    Wang, Shao-Hui
    Han, Zhi-Jie
    Xiao, Fu
    Wang, Ru-Chuan
    Wang, Shao-Hui, 1600, Editorial Board of Journal on Communications (35): : 22 - 32
  • [48] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [49] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [50] SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2014, 23 (03)