An Improved Dynavote E-Voting Protocol Implementation

被引:0
|
作者
AbdulRahim, Abdulwasiu Kailani [1 ]
Folorunso, Olusegun [1 ]
Sharma, Sushil K. [2 ]
机构
[1] Univ Agr, Dept Comp Sci, Abeokuta, Nigeria
[2] Ball State Univ, Informat Syst, Muncie, IN 47306 USA
关键词
Biometrics; DynaVote; E-Voting; E-Voting Requirements; Protocol; Pseudo Voter Identities (PVID); RSA Public Key Cryptography;
D O I
10.4018/jea.2011070104
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Electronic voting-the use of computers or computerized voting equipment to cast and tabulate and tally ballots in an election in a trustable manner-is a pillar of e-Government. The DynaVote voting protocol system proposed by Cetinkaya and Koc (2007) is assumed secure and practicable on a network. However; the DynaVote e-Voting protocol does not completely protect the voting counter against impersonated votes, especially when the pseudo-Vote identities are known by the wrong voter or compromised by authorities. To address this problem, a prototype called improved DynaVote e-Vote protocol was designed to protect the counter from anomalies associated with counting impersonated votes (multiple votes) in the same election. This was achieved by introducing biometric fingerprint and pseudo voter identities (PVID) encryption for each voter during voter registration via online or data mining of population data containing fingerprint biometrics. Furthermore, fingerprint reader and RSA public key cryptography is used in PVID to eliminate counting impersonated votes. The performance results showed that improved DynaVote e-Vote protocol is more reliable, eligible, and accurate, and protects voter privacy against other e-Vote protocols.
引用
收藏
页码:44 / 61
页数:18
相关论文
共 50 条
  • [1] Prototype Implementation of DynaVote e-Voting Protocol
    Cetinkaya, Orhan
    Koc, Mehmet Levent
    [J]. 9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 200 - +
  • [2] SEAS, a secure e-voting protocol: Design and implementation
    Baiardi, F
    Falleni, A
    Granchi, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    [J]. COMPUTERS & SECURITY, 2005, 24 (08) : 642 - 652
  • [3] E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy
    Hardwick, Freya Sheer
    Gioulis, Apostolos
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1561 - 1567
  • [4] e-voting requirements and implementation
    Anane, Rachid
    Freeland, Richard
    Theodoropoulos, Georgios
    [J]. 9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 382 - +
  • [5] Analysis and design of e-voting protocol
    Jiang, SQ
    Feng, DG
    Qing, SH
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 281 - 290
  • [6] The design of protocol for e-voting on the Internet
    Jan, JK
    Chen, YY
    Lin, Y
    [J]. 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 180 - 189
  • [7] Implementation of Simple Verifiability Metric to Measure the Degree of Verifiability of E-Voting Protocol
    Suharsono, Teguh Nurhadi
    Anggraini, Dini
    Kuspriyanto
    Rahardjo, Budi
    Gunawan
    [J]. PROCEEDING OF 14TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS, SERVICES, AND APPLICATIONS (TSSA), 2020,
  • [8] A formal analysis of the Neuchatel e-voting protocol
    Cortier, Veronique
    Galindo, David
    Turuani, Mathieu
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 430 - 442
  • [9] MVP: An Efficient Anonymous E-voting Protocol
    Zhou, You
    Zhou, Yian
    Chen, Shigang
    Wu, Samuel S.
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [10] A Formal Analysis of the Norwegian E-voting Protocol
    Cortier, Veronique
    Wiedling, Cyrille
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 109 - 128