Platform-Independent Secure Blockchain-Based Voting System

被引:64
作者
Yu, Bin [1 ]
Liu, Joseph K. [1 ]
Sakzad, Amin [1 ]
Nepal, Surya [2 ]
Steinfeld, Ron [1 ]
Rimba, Paul [2 ]
Au, Man Ho [3 ]
机构
[1] Monash Univ, Melbourne, Vic, Australia
[2] CSIRO, Sydney, NSW, Australia
[3] Hong Kong Polytech Univ, Kowloon, Hong Kong, Peoples R China
来源
INFORMATION SECURITY (ISC 2018) | 2018年 / 11060卷
关键词
Evoting; Blockchain; Ring signature; Homomorphic encryption; LINKABLE RING SIGNATURES; MODELS;
D O I
10.1007/978-3-319-99136-8_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic techniques are employed to ensure the security of voting systems in order to increase its wide adoption. However, in such electronic voting systems, the public bulletin board that is hosted by the third party for publishing and auditing the voting results should be trusted by all participants. Recently a number of blockchain-based solutions have been proposed to address this issue. However, these systems are impractical to use due to the limitations on the voter and candidate numbers supported, and their security framework, which highly depends on the underlying blockchain protocol and suffers from potential attacks (e.g., force-abstention attacks). To deal with two aforementioned issues, we propose a practical platform-independent secure and verifiable voting system that can be deployed on any blockchain that supports an execution of a smart contract. Verifiability is inherently provided by the underlying blockchain platform, whereas cryptographic techniques like Paillier encryption, proof-of-knowledge, and linkable ring signature are employed to provide a framework for system security and user-privacy that are independent from the security and privacy features of the blockchain platform. We analyse the correctness and coercion-resistance of our proposed voting system. We employ Hyperledger Fabric to deploy our voting system and analyse the performance of our deployed scheme numerically.
引用
收藏
页码:369 / 386
页数:18
相关论文
共 41 条
[1]  
Adida B., 2008, USENIX, P335
[2]  
[Anonymous], 2017, IACR CRYPTOLOGY EPRI
[3]  
[Anonymous], 2009, THEGUARDIAN
[4]  
[Anonymous], 2009, STANFORD U
[5]  
[Anonymous], 2016, LECT NOTES COMPUTER, DOI DOI 10.1145/2911151.2911162
[6]  
[Anonymous], 2015, NSW ELECTION RESULT
[7]  
Au MH, 2007, LECT NOTES COMPUT SC, V4464, P79
[8]  
Au MH, 2006, LECT NOTES COMPUT SC, V4329, P364
[9]  
Au MH, 2006, LECT NOTES COMPUT SC, V4043, P101
[10]   Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J].
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Yuen, Tsz Hon .
THEORETICAL COMPUTER SCIENCE, 2013, 469 :1-14