Towards trustworthy e-voting using paper receipts

被引:6
作者
Lee, Yunho [1 ]
Park, Sangjoon [1 ]
Mambo, Masahiro [2 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, Suwon 440746, Gyeonggi Do, South Korea
[2] Univ Tsukuba, Grad Sch Syst & Informat Engn, Dept Comp Sci, Tsukuba, Ibaraki 3058573, Japan
关键词
E-voting; Voter-verifiable e-voting; Paper receipt; SCHEME;
D O I
10.1016/j.csi.2010.03.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proof or confirming evidence of their honesty. This lack of trustworthiness is the main reason why e-voting is not widespread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that their intended votes are casted is to use paper receipts. In this paper, we propose an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known divide-and-choose method. Our scheme requires neither special printers or scanners, nor frequent observations of voting machines. In addition, our scheme is more secure than the previous schemes. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:305 / 311
页数:7
相关论文
共 20 条
[1]  
[Anonymous], 1998, LNCS, DOI DOI 10.1007/BFB0054019
[2]   A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR [J].
BLUM, L ;
BLUM, M ;
SHUB, M .
SIAM JOURNAL ON COMPUTING, 1986, 15 (02) :364-383
[3]  
Chaum D, 2005, LECT NOTES COMPUT SC, V3679, P118
[4]   Secret-ballot receipts: True voter-verifiable elections [J].
Chaum, D .
IEEE SECURITY & PRIVACY, 2004, 2 (01) :38-47
[5]  
CHAUM D, 2002, SECRET BALL IN PRESS
[6]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]   Election security: Perception and reality [J].
Evans, D ;
Paul, N .
IEEE SECURITY & PRIVACY, 2004, 2 (01) :24-31
[9]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[10]  
Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163