A Scheme for Three-way Secure and Verifiable E-Voting

被引:0
|
作者
Nassar, Mohamed [1 ]
Malluhi, Qutaibah [2 ]
Khan, Tanveer [2 ]
机构
[1] Amer Univ Beirut, Dept Comp Sci, Fac Arts & Sci, Beirut, Lebanon
[2] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
Electronic Voting; Paillier Cryptosystem; Homomorphic Encryption; Anonymity; Verifiability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability issues. Designing a system that covers all the general requirements of secure voting is a research challenge. In this paper, we propose a secure online voting protocol based on a partially homomorphic encryption scheme. Our protocol ensures the anonymity of voters while preserving the integrity of the results. Experiments show the viability of our protocol in terms of both security and scalability.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] An Anonymous and Efficient E-voting Scheme
    Ghavamipoor, Hoda
    Shahpasand, Maryam
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-SECURITY (ECDC), 2013,
  • [22] E-voting scheme over the Internet
    Aborizka, Mohamed
    Shedeed, Ahmed
    Saad, Sherif
    [J]. Managing Information in the Digital Economy: Issues & Solutions, 2006, : 503 - 507
  • [23] Protection Profile for Secure E-Voting Systems
    Lee, Kwangwoo
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 386 - 397
  • [24] A practical, secure, and auditable e-voting system
    AboSamra, Kareem M.
    AbdelHafez, Ahmed A.
    Assassa, Ghazy M. R.
    Mursi, Mona F. M.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 69 - 89
  • [25] Principles and requirements for a secure e-voting system
    Gritzalis, DA
    [J]. COMPUTERS & SECURITY, 2002, 21 (06) : 539 - 556
  • [26] Seven Principles for Secure E-Voting Response
    Castro, Daniel
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (02) : 8 - 8
  • [27] End-to-End Verifiable E-Voting Trial for Polling Station Voting
    Hao, Feng
    Wang, Shen
    Bag, Samiran
    Procter, Rob
    Shahandashti, Siamak F.
    Mehrnezhad, Maryam
    Toreini, Ehsan
    Metere, Roberto
    Liu, Lana Y. J.
    [J]. IEEE SECURITY & PRIVACY, 2020, 18 (06) : 6 - 13
  • [28] Development of remotely secure E-voting system
    Keshk, A. E.
    Abdul-Kader, H. M.
    [J]. MEDIA CONVERGENCE: MOVING TO THE NEXT GENERATION, 2007, : 235 - 243
  • [29] SEAS: A Secure E-voting Applet System
    Baiardi, F
    Falleni, A
    Granchi, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 318 - 329
  • [30] Koinonia: Verifiable E-Voting with Long-term Privacy
    Ge, Huangyi
    Chau, Sze Yiu
    Gonsalves, Victor E.
    Li, Huian
    Wang, Tianhao
    Zou, Xukai
    Li, Ninghui
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 270 - 285