Efficient and secure e-voting scheme using elliptic curve cryptography

被引:3
|
作者
Chatterjee, Uddalak [1 ]
Ray, Sangram [1 ]
Adhikari, Sharmistha [1 ]
Khan, Muhammad Khurram [2 ]
Dasgupta, Mou [3 ]
机构
[1] Natl Inst Technol Sikkim, Dept Comp Sci & Engn, Ravangla 737139, Sikkim, India
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[3] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur, Madhya Pradesh, India
关键词
authentication; communication security; cryptography; electronic voting and digital democracy; elliptic curve cryptography;
D O I
10.1002/spy2.283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importance for the honor of the democracy itself. The online voting or e-voting system is a cost-effective procedure, which saves a lot of money and time spent for organizing the election. However, security, integrity of data and privacy of the voter are the increasing concerns in this context. In this paper, we have done a thorough literature survey of the various latest schemes in this context and found that the schemes prone to several security and privacy threats. Moreover, a major issue with all these schemes is that they are inefficient in terms of computation and communication overheads. With this motivation, we present a novel and efficient e-voting scheme to tackle the security and privacy concerns. The proposed scheme is designed using the concept of blind signature, anonymous channel and trust worthy entities where elliptic curve cryptography (ECC) works as a backbone. The proposed scheme is formally evaluated using well known AVISPA simulation tool, which simulates the attack model using CL-AtSe as well as OFMC backend according to Dolev-Yao threat model. In both the cases, all the possible security threats are being nullified by the proposed scheme and results in safe communication. Also, the scheme is analyzed against all the possible attacks that jeopardize the integrity of the existing voting systems. Moreover, the proposed scheme is also compared with other prevailing schemes in terms of computation and communication overheads and found more efficient.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] The Application of Elliptic Curve Cryptography in Secure E-mail System
    Lin, Xia
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS SCIENCE AND ENVIRONMENTAL ENGINEERING, 2016, 52 : 293 - 296
  • [42] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [43] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [44] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [45] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [46] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Huang, Baojun
    Khan, Muhammad Khurram
    Wu, Libing
    Bin Muhaya, Fahad T.
    He, Debiao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 225 - 240
  • [47] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Baojun Huang
    Muhammad Khurram Khan
    Libing Wu
    Fahad T. Bin Muhaya
    Debiao He
    Wireless Personal Communications, 2015, 85 : 225 - 240
  • [48] Novel Blind Signcryption Scheme for E-Voting System Based on Elliptic Curves
    Waheed, Abdul
    Din, Nizamud
    Umar, Arif Iqbal
    Ullah, Riaz
    Ul-Amin, Noor
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (02) : 314 - 322
  • [49] An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    Peng, Cong
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (04): : 390 - 401
  • [50] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453