Efficient and secure e-voting scheme using elliptic curve cryptography

被引:3
|
作者
Chatterjee, Uddalak [1 ]
Ray, Sangram [1 ]
Adhikari, Sharmistha [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur, Madhya Pradesh, India
关键词
authentication; communication security; cryptography; electronic voting and digital democracy; elliptic curve cryptography;
D O I
10.1002/spy2.283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importance for the honor of the democracy itself. The online voting or e-voting system is a cost-effective procedure, which saves a lot of money and time spent for organizing the election. However, security, integrity of data and privacy of the voter are the increasing concerns in this context. In this paper, we have done a thorough literature survey of the various latest schemes in this context and found that the schemes prone to several security and privacy threats. Moreover, a major issue with all these schemes is that they are inefficient in terms of computation and communication overheads. With this motivation, we present a novel and efficient e-voting scheme to tackle the security and privacy concerns. The proposed scheme is designed using the concept of blind signature, anonymous channel and trust worthy entities where elliptic curve cryptography (ECC) works as a backbone. The proposed scheme is formally evaluated using well known AVISPA simulation tool, which simulates the attack model using CL-AtSe as well as OFMC backend according to Dolev-Yao threat model. In both the cases, all the possible security threats are being nullified by the proposed scheme and results in safe communication. Also, the scheme is analyzed against all the possible attacks that jeopardize the integrity of the existing voting systems. Moreover, the proposed scheme is also compared with other prevailing schemes in terms of computation and communication overheads and found more efficient.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Shehzad Ashraf Chaudhry
    Mohammad Sabzinejad Farash
    Husnain Naqvi
    Muhammad Sher
    Electronic Commerce Research, 2016, 16 : 113 - 139
  • [32] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [33] Efficient and secure business model for content centric network using elliptic curve cryptography
    Adhikari, Sharmistha
    Ray, Sangram
    Biswas, Gosta P.
    Obaidat, Mohammad S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [34] Seven Principles for Secure E-Voting
    Gerlach, Frank
    COMMUNICATIONS OF THE ACM, 2009, 52 (02) : 8 - 8
  • [35] A Design of Secure Preferential E-Voting
    Peng, Kun
    Bao, Feng
    E-VOTING AND IDENTITY, PROCEEDINGS, 2009, 5767 : 141 - 156
  • [36] Secure E-Voting with blind signature
    Ibrahim, S
    Kamat, M
    Salleh, M
    Aziz, SRA
    4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 193 - 197
  • [37] On Secure E-Voting over Blockchain
    McCorry P.
    Mehrnezhad M.
    Toreini E.
    Shahandashti S.F.
    Hao F.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [38] A SECURE E-VOTING FOR THE STUDENT PARLIAMENT
    Pilipovic, Dragoljub
    Babic, Djordje
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2016, 29 (02) : 205 - 218
  • [39] Secure e-voting for preferential elections
    Aditya, R
    Boyd, C
    Dawson, E
    Viswanathan, K
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2003, 2739 : 246 - 249
  • [40] A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key
    Zhang, Yi
    Cui, Tianxi
    Tang, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 336 - +