Efficient and secure e-voting scheme using elliptic curve cryptography

被引:3
|
作者
Chatterjee, Uddalak [1 ]
Ray, Sangram [1 ]
Adhikari, Sharmistha [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur, Madhya Pradesh, India
关键词
authentication; communication security; cryptography; electronic voting and digital democracy; elliptic curve cryptography;
D O I
10.1002/spy2.283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importance for the honor of the democracy itself. The online voting or e-voting system is a cost-effective procedure, which saves a lot of money and time spent for organizing the election. However, security, integrity of data and privacy of the voter are the increasing concerns in this context. In this paper, we have done a thorough literature survey of the various latest schemes in this context and found that the schemes prone to several security and privacy threats. Moreover, a major issue with all these schemes is that they are inefficient in terms of computation and communication overheads. With this motivation, we present a novel and efficient e-voting scheme to tackle the security and privacy concerns. The proposed scheme is designed using the concept of blind signature, anonymous channel and trust worthy entities where elliptic curve cryptography (ECC) works as a backbone. The proposed scheme is formally evaluated using well known AVISPA simulation tool, which simulates the attack model using CL-AtSe as well as OFMC backend according to Dolev-Yao threat model. In both the cases, all the possible security threats are being nullified by the proposed scheme and results in safe communication. Also, the scheme is analyzed against all the possible attacks that jeopardize the integrity of the existing voting systems. Moreover, the proposed scheme is also compared with other prevailing schemes in terms of computation and communication overheads and found more efficient.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [22] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
  • [23] Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography
    Chouhan, Ankit
    Kumari, Anupam
    Saiyad, Makhduma
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 776 - 780
  • [24] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [25] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    Multimedia Tools and Applications, 2015, 74 : 3477 - 3488
  • [26] Secure E-Voting System Implementation Using CryptDB
    Vemula S.
    Kovvur R.M.R.
    Marneni D.
    SN Computer Science, 2021, 2 (3)
  • [27] Towards Secure E-Voting Using Ethereum Blockchain
    Koc, Ali Kaan
    Yavuz, Emre
    Cabuk, Umut Can
    Dalkilic, Gokhan
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 143 - 148
  • [28] A Hybrid E-Voting Scheme
    Peng, Kun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 195 - 206
  • [29] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [30] Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
    Zhang, Yuanyuan
    Khan, Muhammad Khurram
    Chen, Jianhua
    He, Debiao
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015