Self-tallying e-voting with public traceability based on blockchain

被引:4
作者
Lu, Yichao [1 ]
Li, Huilin [2 ]
Gao, Le [1 ]
Yu, Jiaxin [1 ]
Yu, Yong [2 ]
Su, Hexing [1 ]
机构
[1] Wuyi Univ, Fac Intelligent Mfg, Jiangmen 529020, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
国家重点研发计划;
关键词
E-voting; Public traceability; Self-tallying; Blockchain; SIGNATURES; SECURITY;
D O I
10.1016/j.csi.2023.103795
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the post-epidemic era, the prevalence of remote collaborations in modern work environments highlight the importance of e-voting as a critical component in facilitating distributed decision-making. Most of the existing e-voting systems heavily rely on a centralized tally authority which requires a high degree of moral trust. However, this kind of architecture is insufficient for expected decentralization and verifiability in remote decision-making. A self-tallying e-voting system is more in line with our developed demands, nonetheless, it suffers adaptive and abortive issues inherently and as a result, fairness cannot be guaranteed. In this paper, we try to provide rational trust by building a blockchain-based self-tallying e-voting system with public traceability. We improve fairness and achieve a balance between privacy and accountability by taking advantage of a time-lock puzzle and traceable ring signature, in which the puzzle-solving time does not impose a real burden. We propose a concrete construction and prove that our protocol satisfies time-limited ballot secrecy, anonymity, exculpability, public traceability, self-tallying and fairness. We implement the prototype both on-chain and off-chain, and the results of time overhead of each phase demonstrate the practicability of our proposal.
引用
收藏
页数:13
相关论文
共 44 条
  • [1] Adida Ben, 2008, USENIX SECURITY S, V17, P335
  • [2] Au MH, 2006, LECT NOTES COMPUT SC, V4058, P223
  • [3] Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment
    Bera, Basudeb
    Vangala, Anusha
    Das, Ashok Kumar
    Lorenz, Pascal
    Khan, Muhammad Khurram
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [4] Blum M., 1988, STOC'88: Proceedings of the twentieth annual ACM symposium on Theory of computing, P103, DOI DOI 10.1145/62212.62222
  • [5] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [6] Communication, collaboration and contagion: "Virtualisation" of anatomy duringCOVID-19
    Byrnes, Kevin G.
    Kiely, Patrick A.
    Dunne, Colum P.
    McDermott, Kieran W.
    Coffey, John Calvin
    [J]. CLINICAL ANATOMY, 2021, 34 (01) : 82 - 89
  • [7] Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
  • [8] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [9] CHAUM D, 1988, LECT NOTES COMPUT SC, V330, P177
  • [10] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88