Secure and Decentralized Anonymous E-Voting Scheme

被引:0
作者
Pedin, Allan B. [1 ]
Siasi, Nazli [2 ]
机构
[1] Christopher Newport Univ, Newport News, VA 23606 USA
[2] DePaul Univ, Chicago, IL USA
来源
PROCEEDINGS OF THE 2023 ACM SOUTHEAST CONFERENCE, ACMSE 2023 | 2023年
关键词
Anonymity; decentralization; electronic voting; secret sharing; secure multi-party computation;
D O I
10.1145/3564746.3587107
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure electronic voting (e-voting) schemes are an imperative topic in today's society as we transition to an increasingly online world. Conventional e-voting processes are centralized that heavily rely on a central aggregator which can raise privacy concerns. Hence, this paper proposes a novel decentralized e-voting scheme that uses the BGW protocol, secure multi-party computation (MPC), and secret sharing as part of a distributed computation mechanism among all the voters to generate a fair and safe e-voting system. Additionally, the proposed scheme provides fully decentralized vote counting, ensures anonymity to further enhance the security of the protocol, and delivers the results of the vote to users. The security of the proposed e-voting scheme is evaluated using prominent security theorems, where the analysis shows that the scheme satisfies several security attributes of secure e-voting, and is more secure and reliable than conventional e-voting protocols.
引用
收藏
页码:172 / 176
页数:5
相关论文
共 7 条
[1]   Secure Multi-Party Computation [J].
Bayatbabolghani, Fattaneh ;
Blanton, Marina .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2157-2159
[2]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[3]  
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[4]   An Electronic Voting Scheme Based On Secure Multi-Party Computation [J].
Gang, Cao .
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :292-294
[5]  
Pu 38H., 2021, International Journal of Network Security, V23, P997, DOI DOI 10.6633/IJNS.202111_23(6).06
[6]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[7]  
Wang JJ, 2020, 2020 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND ARTIFICIAL INTELLIGENCE (ICMAI 2020), P50, DOI [10.1109/CyberC49757.2020.00018, 10.1145/3395260.3395300]