Self-tallying e-voting with public traceability based on blockchain

被引:6
作者
Lu, Yichao [1 ]
Li, Huilin [2 ]
Gao, Le [1 ]
Yu, Jiaxin [1 ]
Yu, Yong [2 ]
Su, Hexing [1 ]
机构
[1] Wuyi Univ, Fac Intelligent Mfg, Jiangmen 529020, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
国家重点研发计划;
关键词
E-voting; Public traceability; Self-tallying; Blockchain; SIGNATURES; SECURITY;
D O I
10.1016/j.csi.2023.103795
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the post-epidemic era, the prevalence of remote collaborations in modern work environments highlight the importance of e-voting as a critical component in facilitating distributed decision-making. Most of the existing e-voting systems heavily rely on a centralized tally authority which requires a high degree of moral trust. However, this kind of architecture is insufficient for expected decentralization and verifiability in remote decision-making. A self-tallying e-voting system is more in line with our developed demands, nonetheless, it suffers adaptive and abortive issues inherently and as a result, fairness cannot be guaranteed. In this paper, we try to provide rational trust by building a blockchain-based self-tallying e-voting system with public traceability. We improve fairness and achieve a balance between privacy and accountability by taking advantage of a time-lock puzzle and traceable ring signature, in which the puzzle-solving time does not impose a real burden. We propose a concrete construction and prove that our protocol satisfies time-limited ballot secrecy, anonymity, exculpability, public traceability, self-tallying and fairness. We implement the prototype both on-chain and off-chain, and the results of time overhead of each phase demonstrate the practicability of our proposal.
引用
收藏
页数:13
相关论文
共 44 条
[1]  
Adida B., 2008, P 17 C SEC S USENIX, P335
[2]  
Au MH, 2006, LECT NOTES COMPUT SC, V4058, P223
[3]   Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment [J].
Bera, Basudeb ;
Vangala, Anusha ;
Das, Ashok Kumar ;
Lorenz, Pascal ;
Khan, Muhammad Khurram .
COMPUTER STANDARDS & INTERFACES, 2022, 80
[4]  
Blum M, 1988, ACM S THEORY COMPUTI, P103, DOI [DOI 10.1145/62212.62222, 10.1145/62212.62222]
[5]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[6]   Communication, collaboration and contagion: "Virtualisation" of anatomy duringCOVID-19 [J].
Byrnes, Kevin G. ;
Kiely, Patrick A. ;
Dunne, Colum P. ;
McDermott, Kieran W. ;
Coffey, John Calvin .
CLINICAL ANATOMY, 2021, 34 (01) :82-89
[7]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[8]   Efficient public-key authenticated deniable encryption schemes [J].
Cao, Yanmei ;
Wei, Jianghong ;
Zhang, Fangguo ;
Xiang, Yang ;
Chen, Xiaofeng .
COMPUTER STANDARDS & INTERFACES, 2022, 82
[9]  
CHAUM D, 1988, LECT NOTES COMPUT SC, V330, P177
[10]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88