Homomorphic RSA Tallying and Its Randomization for e-Voting

被引:0
|
作者
Yucel, Okan [1 ]
Baykal, Nazife [1 ]
机构
[1] METU Informat Inst, Ankara, Turkey
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT | 2010年
关键词
Anonymity; electronic-voting; homomorphic tallying; multiplicative homomorphism; public key encryption; RSA randomization; PUBLIC-KEY CRYPTOSYSTEMS; SCHEME; VOTER;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Contemporary e-voting schemes use either mix networks or homomorphic tallying to preserve the anonymity of votes. Homomorphic addition property of a public key encryption algorithm provides anonymity by allowing joint decryption of the vote sums at the tallying office; instead of separate decryption of each encrypted vote. Exponential ElGamal and Paillier algorithms are additively homomorphic that makes them suitable for homomorphic tallying. Alternatively, RSA and ElGamal algorithms are not additively homomorphic but they have the property of homomorphic multiplication, so that decryption of the product of encrypted messages yields the product of messages. In this work, we show that e-voting with multiplicative homomorphic RSA tallying is possible if the algorithm is properly randomized and each candidate is associated with a unique prime number on the electronic ballot. We explain how the unique prime factorization of the vote product can be employed to compute the individual vote counts and discuss the feasibility of such a system. The absence of random parameters in the RSA algorithm is a major disadvantage, especially within the context of e-voting, where each voter uses the public key of the tallying authority and the number of possible messages to be encrypted is equal to the limited number of candidates. Although in different applications, the RSA algorithm is randomized by adding random padding bits to the plaintext; this approach doesn't work for the proposed homomorphic tallying, since a randomization that would change the unique prime factorization in the vote product is not allowable. To solve this problem, we propose new randomizations for homomorphic RSA tallying. We comment on implementation details such as cancellation of the randomization load and size of the RSA modulus with respect to the voter set.
引用
收藏
页码:160 / 167
页数:8
相关论文
共 50 条
  • [21] Kleptographic attacks on e-voting schemes
    Gogolewski, Marcin
    Klonowski, Marek
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    Zagorski, Filip
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 494 - 508
  • [22] Analysis and design of e-voting protocol
    Jiang, SQ
    Feng, DG
    Qing, SH
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 281 - 290
  • [23] E-Voting System using Biometrics
    Lakshmi, G. Rama
    Rekha, Ch Sri
    Likhitha, V
    Alekhya, T.
    Renuka, K., V
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1441 - 1444
  • [24] Double Voting Problem of Some Anonymous E-Voting Schemes
    Asadpour, Mahdi
    Jalili, Rasool
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (03) : 895 - 906
  • [25] A Scheme for Three-way Secure and Verifiable E-Voting
    Nassar, Mohamed
    Malluhi, Qutaibah
    Khan, Tanveer
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [26] A secure and auditable cryptographic-based e-voting scheme
    Mursi, Mona F. M.
    Assassa, Ghazy M. R.
    AbdelHafez, Ahmed A.
    AboSamra, Kareem M.
    2015 SECOND INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI), 2015, : 253 - 262
  • [27] Cryptanalysis on Mu-Varadharajan's e-voting schemes
    Chien, HY
    Jan, JK
    Tseng, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 139 (2-3) : 525 - 530
  • [28] Preventing Coercion in E-Voting: Be Open and Commit
    Jamroga, Wojciech
    Tabatabaei, Masoud
    ELECTRONIC VOTING, E-VOTE-ID 2016, 2017, 10141 : 1 - 17
  • [29] Principles and requirements for a secure e-voting system
    Gritzalis, DA
    COMPUTERS & SECURITY, 2002, 21 (06) : 539 - 556
  • [30] An E-Voting System Based on Tornado Cash
    Bistarelli, Stefano
    Montalvo, Bruno Lazo La Torre
    Mercanti, Ivan
    Santini, Francesco
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 : 120 - 135