scholarly journals Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

2017 ◽  
Vol 2017 ◽  
pp. 1-16
Author(s):  
Shin-Yan Chiou ◽  
Tsung-Ju Wang ◽  
Jiun-Ming Chen

Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server). We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

2013 ◽  
Vol 7 (2) ◽  
pp. 1-28
Author(s):  
Katharina Bräunlich ◽  
Rüdiger Grimm

Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


Voting is the principal incident in any democratic country. Generally voting is done using ballots system, but this technique is ancient and can be easily sabotaged. There is a necessity to bring in new technologies to ensure effective implementation of digital voting systems. The security of digital voting is a significant aspect for implementation and must meet the requirements to be appropriate for trust worthiness. Block chain technology provides reliable electronic voting system that can be secured by adding more decision so that the possible attacks can be avoided. Block chain technology based on crypto currency implements diffused database architecture with transaction records secured by transactions.


2021 ◽  
Vol 7 (2) ◽  
pp. 102-109
Author(s):  
W. Salman

The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.


Author(s):  
Yurong Yao ◽  
Edward Watson

Electronic voting has become a viable form of e-government due to the rapid advances in technologies and communication networks. The United States and most European and Asian Countries, like Japan, have taken the first step towards electronic elections. The unique features of electronic voting systems bring advantages to the public as well as resulting in concerns about electronic voting system (EVS) implementation. In this chapter, we examine those advantages of EVS and the principal obstacles in its implementation: privacy, security and accessibility. By investigating the current technology and government efforts to overcome these problems, some recommendations are proposed to gain voters’ trust on EVS and further increase their participation by using EVS.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5874
Author(s):  
Uzma Jafar ◽  
Mohd Juzaiddin Ab Aziz ◽  
Zarina Shukur

Online voting is a trend that is gaining momentum in modern society. It has great potential to decrease organizational costs and increase voter turnout. It eliminates the need to print ballot papers or open polling stations—voters can vote from wherever there is an Internet connection. Despite these benefits, online voting solutions are viewed with a great deal of caution because they introduce new threats. A single vulnerability can lead to large-scale manipulations of votes. Electronic voting systems must be legitimate, accurate, safe, and convenient when used for elections. Nonetheless, adoption may be limited by potential problems associated with electronic voting systems. Blockchain technology came into the ground to overcome these issues and offers decentralized nodes for electronic voting and is used to produce electronic voting systems mainly because of their end-to-end verification advantages. This technology is a beautiful replacement for traditional electronic voting solutions with distributed, non-repudiation, and security protection characteristics. The following article gives an overview of electronic voting systems based on blockchain technology. The main goal of this analysis was to examine the current status of blockchain-based voting research and online voting systems and any related difficulties to predict future developments. This study provides a conceptual description of the intended blockchain-based electronic voting application and an introduction to the fundamental structure and characteristics of the blockchain in connection to electronic voting. As a consequence of this study, it was discovered that blockchain systems may help solve some of the issues that now plague election systems. On the other hand, the most often mentioned issues in blockchain applications are privacy protection and transaction speed. For a sustainable blockchain-based electronic voting system, the security of remote participation must be viable, and for scalability, transaction speed must be addressed. Due to these concerns, it was determined that the existing frameworks need to be improved to be utilized in voting systems.


2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Ch Anwar ul Hassan ◽  
Muhammad Hammad ◽  
Jawaid Iqbal ◽  
Saddam Hussain ◽  
Syed Sajid Ullah ◽  
...  

Developing an electronic voting system that meets the practical needs of administrators has been a difficult task for a long time. Now, blockchain technologies solve this problem by providing a distributed ledger with immutable, encrypted, and secure transactions. Distributed ledger technologies are an interesting technological leap in the field of data innovation, transparency, and trustability. In public blockchain, distributed ledger technology is widely used. The blockchain technology can be used in an almost infinite number of ways to benefit from sharing economies. The purpose of this study is to assess how blockchain may be utilized to build electronic voting systems that can be used as a service. The purpose of electronic voting systems is explained in this article, as are the technological and legal limitations of employing blockchain as a service. Then, using blockchain as a foundation, we propose a new electronic voting system that fixes the flaws we observed. In general, this paper evaluates the capabilities of distributed ledger technologies by depicting a contextual investigation in order to fine-tune the process of political election decisions and employing a blockchain-based application that improves security and lowers the cost of conducting nationwide elections.


Author(s):  
Demid Migal ◽  
Kateryna Isirova

The work examines the phenomenon of electronic voting and advantages and disadvantages of such systems. Particular attention is paid to the electronic voting systems that use block chain technologies in their scheme. The purpose of the publication is to create a theoretical model of the electronic voting system, which will include all stages of the elections. In this work, a study and analysis of the existing electronic voting systems were carried out, the requirements for the creation of electronic voting systems were substantiated. Possible attacks on both conventional electronic voting systems and options using the block chain were given. The advantages of the work include theoretical and practical models, comparison and study of possible attacks on various types of electronic voting systems.


Author(s):  
Oladotun O. Okediran ◽  
Adeyemi A. Sijuade ◽  
Wajeed B. Wahab

Conventional voting techniques have been employed over the years in most elections. However, each of these techniques has attendant short comings. The existing conventional voting systems have been subjected to gross abuse and irregularities. Electronic voting (e-voting) which is emerging as an alternative to these conventional voting systems, though highly promising, is not also totally free of flaws; information security issues bordering on privacy, integrity and verifiability of the electronic ballots casted are still significant in most implementations of e-voting systems. In this paper, we developed a security scheme that was based on a hybrid Rivest-Sharma-Adleman (RSA) algorithm and Advance Encryption Standard (AES) algorithm with Least Significant Bit (LSB) replacement algorithm for securing ballot information in an e-voting system. An e-voting system with multiple voting channels which includes poll site voting, mobile voting and remote internet voting was developed in the contextual Nigerian scenario. The electronic ballots casted via the system during experimental usage were encrypted using the hybrid RSA-AES algorithm to circumvent the problems of privacy, integrity and verifiability associated with many e-voting systems. The encrypted ballots were then hidden using LSB replacement algorithm to improve their integrity. The image quality of the cover image used and stego image obtained from the security scheme developed was quantitatively assessed using Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Correlation. Furthermore, a performance evaluation based on users' perception of the developed e-voting system showed that the system satisfied most of the generic security requirements for electronic voting.


Sign in / Sign up

Export Citation Format

Share Document