Abstract
Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally.
Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields.
In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.REFERENCES
Vladucu, M.V., Dong, Z., Medina, J., and Rojas-Cessa, R., E-voting meets blockchain: a survey, IEEE Access, 2023, vol. 11, pp. 23293–23308. https://doi.org/10.1109/ACCESS.2023.3253682
Shahzad, B. and Crowcroft, J., Trustworthy electronic voting using adjusted blockchain technology, IEEE Access, 2019, vol. 7, pp. 24477–24488. https://doi.org/10.1109/ACCESS.2019.2895670
Benabdallah, A., Audras, A., Coudert, L., El Madhoun, N., and Badra, M., Analysis of blockchain solutions for E-voting: a systematic literature review, IEEE Access, 2022, vol. 10, pp. 70746–70759. https://doi.org/10.1109/ACCESS.2022.3187688
A Consensus Study Report of National Academies of Sciences, Engineering, and Medicine, “Securing the Vote: Protecting American Democracy”, Washington: The National Acad. Press, 2018. https://doi.org/10.17226/25120
Chaudhary, S., et al., Blockchain-based secure voting mechanism underlying 5G network: A smart contract approach, IEEE Access, 2023, vol. 11, pp. 76537–76550. .https://doi.org/10.1109/ACCESS.2023.3297492
Rathee, G., Iqbal, R., Waqar, O., and Bashir, A.K., On the design and implementation of a blockchain enabled E-voting application within IoT-oriented smart cities, IEEE Access, 2021, vol. 9, pp. 34165–34176. https://doi.org/10.1109/ACCESS.2021.3061411
Kim, M., Toward round-efficient verifiable re-encryption Mix-Net, IEEE Access, 2022, vol. 10, pp. 91397–91413. https://doi.org/10.1109/ACCESS.2022.3202966
Yaakobi, E., Langberg, M., and Bruck, J., Information-theoretic study of voting systems, Proc. IEEE Int. Symp. on Information Theory, Istanbul, 2013, pp. 1087–1091. https://doi.org/10.1109/ISIT.2013.6620394
Hosp, B. and Vora, P.L., An information-theoretic model of voting systems, Math. Comput. Modell., 2008, vol. 48, pp. 1628–1645. https://doi.org/10.1016/j.mcm.2008.05.040
Haroutunian, M., Hakobyan, P., and Avetisyan, A., Two-stage optimal hypotheses testing for a model of stegosystem with an active adversary, J. Univers. Comput. Sci., 2023, vol. 29, no. 11, pp. 1254–1273. https://doi.org/10.3897/jucs.112913
Avetisyan, A., Haroutunian, M., and Hakobyan, P., Discussion on steganographic methods from the perspective of E-voting implementation, Proc. 14th Int. Conf. Computer Science and Information Technologies CSIT’23, Yerevan, 2023, pp. 214–217. https://doi.org/10.51408/csit2023_51.
Cover, T.M. and Thomas, J.A., Elements of Information Theory, Wiley, 2006, 2nd ed.
Escolano, F., Suau, P., and Bonev, B., Information Theory in Computer Vision and Pattern Recognition, London: Springer, 2009.
Haroutunian, M., Asatryan, D., and Mastoyan, K., Analyzing the quality of distorted images by the normalized mutual information measure, Math. Probl. Comput. Sci., 2024, vol. 61, pp. 7–14. https://doi.org/10.51408/1963-0111
Jain, A.K. and Li, S.Z., Handbook of Face Recognition, Berlin: Springer, 2005.
Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G., Information hiding: a survey, Proc. IEEE, 1999, vol. 87, no. 7, pp. 1062–1078. https://doi.org/10.1109/5.771065
ACKNOWLEDGMENTS
We thank the reviewers for their valuable comments aimed at improving our manuscript.
Funding
The work was supported by the Science Committee of the Republic of Armenia, in the frames of the research 21T-1B151.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Publisher’s Note.
Pleiades Publishing remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
AI tools may have been used in the translation or editing of this article.
Rights and permissions
About this article
Cite this article
Haroutunian, M.E., Margaryan, A.S. & Mastoyan, K.A. New Approach for Online Voting Ensuring Privacy and Verifiability. Program Comput Soft 50 (Suppl 1), S60–S68 (2024). https://doi.org/10.1134/S0361768824700427
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0361768824700427