A New E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mixnet

被引:0
作者
Islam, Nazmul [1 ]
Alam, Kazi Md. Rokibul [2 ]
Tamura, Shinsuke [3 ]
Morimoto, Yasuhiko [4 ]
机构
[1] Khulna Univ Engn & Technol, Inst Informat & Commun Technol, Khulna 9203, Bangladesh
[2] Khulna Univ Engn & Technol, Dept Comp Sci & Engn, Khulna 9203, Bangladesh
[3] Univ Fukui, Grad Sch Engn, Fukui 9108507, Japan
[4] Hiroshima Univ, Grad Sch Engn, Higashihiroshima 7398521, Japan
来源
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS) | 2017年
关键词
Electronic voting; Revised-SVRM; ElGamal; RSA; Confirmation numbers; Anonymous credential;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new electronic voting (e-voting) scheme that exploits confirmation numbers (CNs) and revised simplified verifiable re-encryption mixnet (R-SVRM). R-SVRM is a recently introduced mechanism of mixnet also used to develop an e-voting scheme where a vote is decomposed to protect its voter from being coerced to cast a particular vote. Though the scheme avoids complicated zero knowledge proof (ZKP), the verification procedures of its cryptographic operations are still cumbersome. Again, another e-voting scheme based on CNs comes with benefits of vote verifiability and unlinkability between the vote and its voter, lags behind in adopting public keys for encryption and signature verification. Also its exploited mixnet is not verifiable; therefore requires a pair of signatures on each encrypted vote to ensure the verifiability of mixnet. Hence, the computation and communication overhead of the scheme becomes weighty, though ZKP is avoided. In contrast, the proposed scheme deploys both CNs and R-SVRM to eliminate these limitations. Hence, any coercer cannot force the voter to cast a specific vote as well as cryptographic operations and their verifications become simpler. Also the computation and communication overheads for involved entities get decreased. Finally, the security requirements of evoting are achieved more elegantly.
引用
收藏
页码:12 / 20
页数:9
相关论文
共 15 条
[1]  
Alam K. M. R., 2010, IEEJ T EIS, V130, P2065
[2]  
AlSammak A., 2015, Adv. Comput. Sci., Int. J., V4, P98
[3]  
[Anonymous], 2015, ACM SIGLOG News, DOI [DOI 10.1145/2728816.2728823, 10.1145/2728816.2728823]
[4]  
Childs LN, 2009, A concrete introduction to higher algebra
[5]  
Hirt M, 2000, LECT NOTES COMPUT SC, V1807, P539
[6]   Commutative Re-encryption Techniques: Significance and Analysis [J].
Islam, Nazmul ;
Alam, Kazi Md. Rokibul ;
Rahman, Shaikh Shiam .
INFORMATION SECURITY JOURNAL, 2015, 24 (4-6) :185-193
[7]  
Islam N, 2013, COMPUT FRAUD SECUR, P9, DOI 10.1016/S1361-3723(13)70111-8
[8]  
Li Huian, 2014, COMP COMM NETW ICCN
[9]  
Rana A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P229
[10]   Security requirements engineering for specifying security requirements of an e-voting system as a legitimate solution to e-governance [J].
Salini, P. ;
Kanmani, S. .
International Journal of Wireless and Mobile Computing, 2014, 7 (04) :400-413