Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

New Approach for Online Voting Ensuring Privacy and Verifiability

  • Published:
Programming and Computer Software Aims and scope Submit manuscript

Abstract

Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally.

Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields.

In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

REFERENCES

  1. Vladucu, M.V., Dong, Z., Medina, J., and Rojas-Cessa, R., E-voting meets blockchain: a survey, IEEE Access, 2023, vol. 11, pp. 23293–23308. https://doi.org/10.1109/ACCESS.2023.3253682

    Article  Google Scholar 

  2. Shahzad, B. and Crowcroft, J., Trustworthy electronic voting using adjusted blockchain technology, IEEE Access, 2019, vol. 7, pp. 24477–24488. https://doi.org/10.1109/ACCESS.2019.2895670

    Article  Google Scholar 

  3. Benabdallah, A., Audras, A., Coudert, L., El Madhoun, N., and Badra, M., Analysis of blockchain solutions for E-voting: a systematic literature review, IEEE Access, 2022, vol. 10, pp. 70746–70759. https://doi.org/10.1109/ACCESS.2022.3187688

    Article  Google Scholar 

  4. A Consensus Study Report of National Academies of Sciences, Engineering, and Medicine, “Securing the Vote: Protecting American Democracy”, Washington: The National Acad. Press, 2018. https://doi.org/10.17226/25120

  5. Chaudhary, S., et al., Blockchain-based secure voting mechanism underlying 5G network: A smart contract approach, IEEE Access, 2023, vol. 11, pp. 76537–76550. .https://doi.org/10.1109/ACCESS.2023.3297492

    Article  Google Scholar 

  6. Rathee, G., Iqbal, R., Waqar, O., and Bashir, A.K., On the design and implementation of a blockchain enabled E-voting application within IoT-oriented smart cities, IEEE Access, 2021, vol. 9, pp. 34165–34176. https://doi.org/10.1109/ACCESS.2021.3061411

    Article  Google Scholar 

  7. Kim, M., Toward round-efficient verifiable re-encryption Mix-Net, IEEE Access, 2022, vol. 10, pp. 91397–91413. https://doi.org/10.1109/ACCESS.2022.3202966

    Article  Google Scholar 

  8. Yaakobi, E., Langberg, M., and Bruck, J., Information-theoretic study of voting systems, Proc. IEEE Int. Symp. on Information Theory, Istanbul, 2013, pp. 1087–1091. https://doi.org/10.1109/ISIT.2013.6620394

  9. Hosp, B. and Vora, P.L., An information-theoretic model of voting systems, Math. Comput. Modell., 2008, vol. 48, pp. 1628–1645. https://doi.org/10.1016/j.mcm.2008.05.040

    Article  MathSciNet  Google Scholar 

  10. Haroutunian, M., Hakobyan, P., and Avetisyan, A., Two-stage optimal hypotheses testing for a model of stegosystem with an active adversary, J. Univers. Comput. Sci., 2023, vol. 29, no. 11, pp. 1254–1273. https://doi.org/10.3897/jucs.112913

    Article  Google Scholar 

  11. Avetisyan, A., Haroutunian, M., and Hakobyan, P., Discussion on steganographic methods from the perspective of E-voting implementation, Proc. 14th Int. Conf. Computer Science and Information Technologies CSIT’23, Yerevan, 2023, pp. 214–217. https://doi.org/10.51408/csit2023_51.

  12. Cover, T.M. and Thomas, J.A., Elements of Information Theory, Wiley, 2006, 2nd ed.

  13. Escolano, F., Suau, P., and Bonev, B., Information Theory in Computer Vision and Pattern Recognition, London: Springer, 2009.

    Book  Google Scholar 

  14. Haroutunian, M., Asatryan, D., and Mastoyan, K., Analyzing the quality of distorted images by the normalized mutual information measure, Math. Probl. Comput. Sci., 2024, vol. 61, pp. 7–14. https://doi.org/10.51408/1963-0111

    Article  Google Scholar 

  15. Jain, A.K. and Li, S.Z., Handbook of Face Recognition, Berlin: Springer, 2005.

    Google Scholar 

  16. Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G., Information hiding: a survey, Proc. IEEE, 1999, vol. 87, no. 7, pp. 1062–1078. https://doi.org/10.1109/5.771065

    Article  Google Scholar 

Download references

ACKNOWLEDGMENTS

We thank the reviewers for their valuable comments aimed at improving our manuscript.

Funding

The work was supported by the Science Committee of the Republic of Armenia, in the frames of the research 21T-1B151.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to M. E. Haroutunian, A. S. Margaryan or K. A. Mastoyan.

Ethics declarations

The authors of this work declare that they have no conflicts of interest.

Additional information

Publisher’s Note.

Pleiades Publishing remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

AI tools may have been used in the translation or editing of this article.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Haroutunian, M.E., Margaryan, A.S. & Mastoyan, K.A. New Approach for Online Voting Ensuring Privacy and Verifiability. Program Comput Soft 50 (Suppl 1), S60–S68 (2024). https://doi.org/10.1134/S0361768824700427

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0361768824700427

Keywords: