Receipt-Free Electronic Voting Scheme with Smart Card Using Blind Signature
Abstract
Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting services than conventional paper-based voting methods. A receipt-free e-voting scheme based on the virtual voting booth that can be implemented with a smart card. Receipt-freeness is achieved by distributing the voting procedure between the voter and the smart card. By using smart cards to randomize part of content of the ballot, the voter cannot construct a receipt. The voter and the smart card jointly contribute randomness for the encryption of the ballot. To provide convenience to voters, sufficient voting facilities are supplied in sufficient public voting booths.References
Alessandro Acquisti. 2010. Receipt-Free Homomorphic Elections and Write-in Ballots. Technical Report. International Association for Crypto Logic Research.
Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, and Guillaume Poupard. 2001. Practical multicandidate election system. In Proceedings of the twentieth annual ACM symposium on Principles of distributed computing - PODC ’01. ACM Press, New York, New York, USA, 274–283.
M. Bellare, A. Boldyreva, and J. Staddon. 2003. Randomness re-use in multi-recipient encryption schemes. In Public Key Cryptography – PKC.
Josh D. Cohen and Michael J. Fischer. 1985. A robust and verifiable cryptographically secure election scheme. In 26th Annual Symposium on Foundations of Computer Science (sfcs 1985). IEEE, 372–382.
P. Laud. 2004. Symmetric encryption in automatic analyses for con. dentiality against active adversaries. In IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.IEEE,71–85.
Peter G. Neumann. 2007. Security Criteria for Electronic Voting. In 16th National Computer Security Conference.
Hannu Nurmi, Arto Salomaa, and Lila Santean. 1991a. Secret ballot elections in computer networks. Computers & Security 10,6(Oct. 1991), 553–560.
Hannu Nurmi, Arto Salomaa, and Lila Santean. 1991b. Secret ballot elections in computer networks. Computers & Security 10,6(Oct. 1991), 553–560.
Roy G. Saltman. 2009. Computerized Voting. In Advances in Computers. Academic Press, Chapter 5, 255–305.
Downloads
Additional Files
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).