Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents

被引:14
|
作者
Will, Mark A. [1 ]
Nicholson, Brandon [1 ]
Tiehuis, Marc [1 ]
Ko, Ryan K. L. [1 ]
机构
[1] Univ Waikato, Cyber Secur Lab, Hamilton, New Zealand
关键词
electronic voting; e-voting; mobile voting; homomorphic encryption; hardware model; cloud computing; privacy;
D O I
10.1109/ICCCRI.2015.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While governments are transitioning to the cloud to leverage efficiency, transparency and accessibility advantages, public opinion - the backbone of democracy - is being left behind. Statistics show that traditional paper voting is failing to reach the technological-savvy generation, with voter turnout decreasing every election for many first-world countries. Remote electronic voting is a possible solution facilitator to this problem, but it still faces several security, privacy and accountability concerns. This paper introduces a practical application of partially homomorphic encryption to help address these challenges. We describe a cloud-based mobile electronic voting scheme, evaluating its security against a list of requirements, and benchmarking performance on the cloud and mobile devices. In order to protect voter privacy, we propose moving away from a public bulletin board so that no individual cipher votes are saved, while still allowing vote verification. As the majority of the security threats faced by electronic voting are from the underlying system, we also introduce the novel concept of using a dedicated hardware server for homomorphic tallying and decryption.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [41] A Novel Implementation of Parallel Homomorphic Encryption for Secure Data Storage in Cloud
    Sethi, Kamalakanta
    Majumdar, Amartya
    Bera, Padmalochan
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [42] Authentication Scheme using Unique Identification method with Homomorphic Encryption in Mobile Cloud Computing
    Chean, Lim Tsu
    Ponnusamy, Vasaki
    Fati, Suliman Mohamed
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE 2018), 2018, : 195 - 200
  • [43] Secure Data Using Homomorphic Encryption Technique for Generating Shorter Cipher Text in Cloud Environment
    Patel, Swachil J.
    Patel, Ronak R.
    [J]. INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 936 - 941
  • [44] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [45] A Secure Distributed Learning Framework Using Homomorphic Encryption
    Ly, Stephen
    Cheng, Yuan
    Chen, Haiquan
    Krovetz, Ted
    [J]. 2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 258 - 266
  • [46] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    [J]. DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
  • [47] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    [J]. ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [48] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    [J]. IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [49] Secure Teleoperation Control Using Somewhat Homomorphic Encryption
    Kosieradzki, Shane
    Zhao, Xiaofeng
    Kawase, Hiroaki
    Qiu, Yingxin
    Kogiso, Kiminao
    Ueda, Jun
    [J]. IFAC PAPERSONLINE, 2022, 55 (37): : 593 - 600
  • [50] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    [J]. 19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233