AvecVoting: Anonymous and Verifiable E-voting with Untrustworthy Counters on Blockchain

被引:6
作者
Li, Meiqi [1 ]
Luo, Xinyi [1 ]
Sun, Wentuo [1 ]
Li, Jian [1 ,2 ]
Xue, Kaiping [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Cyber Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230027, Anhui, Peoples R China
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) | 2022年
基金
中国国家自然科学基金;
关键词
E-voting; Blockchain; Smart Contract; One-time Ring Signature; Reputation;
D O I
10.1109/ICC45855.2022.9838840
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
E-voting plays a vital role in modern social life. However, traditional e-voting systems usually rely on a trusted third party and therefore non-verifiable and prone to a single point of failure. In recent years, many researchers have tried to turn to blockchain to eliminate the vulnerabilities of e-voting systems. However, blockchain-based e-voting brings new problems in protecting voters' privacy and ballots' confidentiality, and causes a great performance degradation. In this paper, we propose AvecVoting, an anonymous and verifiable blockchainbased e-voting scheme, providing both strong security and high performance. Specifically, we utilize threshold encryption and one-time ring signature to protect voters' privacy and ballots' confidentiality. Furthermore, to improve the performance, we introduce the concept "counter" to count the ballots. Through the carefully designed RandomSortition and reputation-based PayOff algorithms based on smart contracts, AvecVoting can achieve correct counting even when some counters are untrustworthy. Our security and performance analyses show that AvecVoting provides strong security such as anonymity, non-repeatability, confidentiality, verifiability, etc., and meanwhile overcome the performance issues caused by blockchain and provides good efficiency in both voting and counting stages.
引用
收藏
页码:4751 / 4756
页数:6
相关论文
共 16 条
[1]  
Adekunle S. E., 2020, ELECT BUSINESS, V12, P19
[2]  
Bistarelli S., 2017, Proceedings of the Symposium on Applied Computing - SAC, V17, P1836, DOI [10.1145/3019612.3019841, DOI 10.1145/3019612.3019841]
[3]  
DESMEDT YG, 1994, EUR T TELECOMMUN, V5, P449
[4]   HSE-Voting: A secure high-efficiency electronic voting scheme based on homomorphic signcryption [J].
Fan, Xingyue ;
Wu, Ting ;
Zheng, Qiuhua ;
Chen, Yuanfang ;
Alam, Muhammad ;
Xiao, Xiaodong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 :754-762
[5]   A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature [J].
Kumar, Mahender ;
Chand, Satish ;
Katti, C. P. .
IEEE SYSTEMS JOURNAL, 2020, 14 (02) :2032-2041
[6]   A Smart Contract for Boardroom Voting with Maximum Voter Privacy [J].
McCorry, Patrick ;
Shahandashti, Siamak F. ;
Hao, Feng .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 :357-375
[7]   Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs [J].
Mundhe, Pravin ;
Yadav, Vijay Kumar ;
Singh, Abhishek ;
Verma, Shekhar ;
Venkatesan, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) :853-881
[8]  
Nakamoto S., 2008, BITCOIN PEER TO PEER
[9]  
Neff C. A., 2001, CCS, P116, DOI 10.1145/501983.502000
[10]  
PARK S, 2021, J CYBERSECURITY, V7, DOI DOI 10.1038/S41420-020-00384-X