Design and practical implementation of verify-your-vote protocol

被引:1
作者
Chaieb, Marwa [1 ]
Yousfi, Souheib [2 ]
Lafourcade, Pascal [3 ]
Robbana, Riadh [2 ]
机构
[1] Univ Tunis El Manar, LIPSIC, Fac Sci Tunis, Tunis, Tunisia
[2] Univ Carthage, Natl Inst Appl Sci & Technol, LIPSIC, Tunis, Tunisia
[3] Univ Clermont Auvergne, LIMOS, Clermont Ferrand, France
关键词
blockchain technology; cryptographic primitives; e-voting; practical implementation; security and performance evaluation; PRIVACY;
D O I
10.1002/cpe.5813
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One of the most critical properties that must be ensured to have a secure electronic voting is verifiability. Political parties, observers, and especially voters want to be able to verify that all eligible votes are cast as intended and counted as cast without compromising votes secrecy or voters privacy. Over the past few decades, an important number of e-voting protocols attempt to deal with this issue by using cryptographic techniques and/or a public bulletin board. Recently, some blockchain-based e-voting systems have been proposed, but were not found practical in the real world, because they do not support situations with large numbers of candidates and voters. In this article, we design and implement a verifiable blockchain-based online voting protocol, called verify-your-vote . Our protocol ensures several security properties thanks to some cryptographic primitives and blockchain technology. We also evaluate its performance in terms of time, cost, and the number of voters and candidates that can be supported.
引用
收藏
页数:17
相关论文
共 22 条
[1]   The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
JOURNAL OF THE ACM, 2018, 65 (01)
[2]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[3]  
Bistarelli S., 2017, Proceedings of the Symposium on Applied Computing - SAC, V17, P1836, DOI 10.1145/3019612.3019841
[4]   End-to-End Voting with Non-Permissioned and Permissioned Ledgers [J].
Bistarelli, Stefano ;
Mercanti, Ivan ;
Santancini, Paolo ;
Santini, Francesco .
JOURNAL OF GRID COMPUTING, 2019, 17 (01) :97-118
[5]   Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif [J].
Blanchet, Bruno .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8604 :54-87
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2012, LECT NOTES COMPUT SC, V7658, P1, DOI 10.1007/978-3-642-34961-4_1
[8]  
Chaieb M., 2018, P EUR MED MIDDL E C, P16
[9]   Verifying privacy-type properties of electronic voting protocols [J].
Delaune, Stephanie ;
Kremer, Steve ;
Ryan, Mark .
JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) :435-487
[10]  
Dreier J, 2012, IEEE ICC, P6710, DOI 10.1109/ICC.2012.6364938