Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3136825.3136876acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms

Published: 13 October 2017 Publication History

Abstract

Information technology is being increasingly introduced into our lives. Most areas of human activity are widely associated with information technology, and electronic voting is no exception. At the moment, there are a number of ready-made solutions, but all of them are not sufficiently safe and open, and most importantly most of them are produced outside the Russian Federation. In such strategically important areas as e-government, in particular electronic elections, it is necessary to be completely confident in the algorithms, principles and systems used. The issue is raised about creating a secure and trustworthy system, and most importantly, an open one and implemented using standardized cryptographic algorithms of the Russian Federation. A model of the system is proposed based on the principle of blind intermediaries developed by the authors and using cryptographic algorithms such as the symmetric cipher GOST R 34.12-2015 (Kuznyechik), hash function GOST R 34.11-2012 (Stribog). The system model proposed by the authors is characterized by a comprehensive approach to electronic voting, namely detailing decisions at all stages of voting. The basic techniques for correct and safe conduct of electronic voting are described, such as the security of transmitted confidential data, the distribution of secret keys, the authentication of the parties, the verification of the transmitted data for integrity, the time control of the transmitted data. It shows how these techniques are implemented. Based on the developed algorithms, a model of the electronic voting system was implemented in C# .Net Framework programming language consisting of a set of window interface applications that interact with each other via network. The efficiency of the developed system is shown. Areas of improvement of the system are noted.

References

[1]
Marcin Kucharczyk, Blind Signatures in Electronic Voting Systems, International Conference on Computer Networks (2010)
[2]
Overview of e-voting systems, Estonia. - Estonian National Electoral Commission. Tallinn 2005.
[3]
Shubhangi S. Shinde, Sonali Shukla, Prof. D. K. Chitre, Secure E-voting Using Homomorphic Technology, International Journal of Emerging Technology and Advanced Engineering (2013)
[4]
Markus Jakobsson, Ari Juels, Ronald L. Rivest, Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking, 11th USENIX Security Symposium (2002)
[5]
Ben Adida, Mixnets in Electronic Voting, Cambridge University (2005)
[6]
Yu Lifshits, Electronic voting (2005), http://yury.name/crypto/03cryptonote.pdf
[7]
Electronic elections: fear of falsification of the results. - Kazakhstan today 2004
[8]
Lipen V.Y., Voronetsky M.A., Lipen D.V., Technology and results of testing electronic voting systems. - United Institute of Informatics Problems NASB 2002.
[9]
David L Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24 (2): 84--90, 1981
[10]
Ali S. T., Murray J. An Overview of End-to-End Verifiable Voting System 2016.
[11]
Smart M., Ritter E. True trustworthy elections: remote electronic voting using trusted computing //International Conference on Autonomic and Trusted Computing. - Germany Heidelberg, 2011. - 187--202.
[12]
Bruck S., Jefferson D., Rivest R. L. A modular voting architecture ("frog voting") // Toward strustworthy elections. - Germany Heidelberg, 2010. - 97--106.
[13]
Jonker H., Mauw S., Pang J. Privacy and verifiability in voting systems: Methods, developments and trends // Computer Science Review. - 2013. - V. 10. - P. 1--30.
[14]
Dossogne J., Lafitte F. Blinded additively homomorphic encryption schemes for self-tallying voting //Journal of Information Security and Applications. - 2015. - V. 22. - P. 40--53.
[15]
Neumann S., Volkamer M. Civitas and the real world: problems and solutions from a practical point of view // Availability, Reliability and Security (ARES), 2012 Seventh International Conference on. - IEEE, 2012. - S. 180--185.
[16]
Yi X., Okamoto E. Practical remote end-to-end voting scheme // International Conference on Electronic Government and the Information Systems Perspective. - Germany Heidelberg, 2011. - S. 386--400.
[17]
Hirt M., Sako K. Efficient receipt-free voting based on homomorphic encryption //International Conference on the Theory and Applications of Cryptographic Techniques. -Germany Heidelberg, 2000. - C. 539--556.
[18]
Jérôme Dossogneb, Frédéric Lafittea, Blinded additively homomorphic encryption schemes for self-tallying voting, Journal of Information Security and Applications, 2013
[19]
Sako K., Kilian J. Secure voting using partially compatible homomorphisms //Annual International Cryptology Conference. - Germany Heidelberg, 1994. - C. 411--424.
[20]
Izabachene M. A Homomorphic LWE Based E-voting Scheme, PQCrypto 2016, Fukuoka, Japan, 2016
[21]
Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret Mac. Alex Halderman, Security Analysis of the Estonian Internet Voting System, University of Michigan, Ann Arbor, MI, U.S.A. (2014)

Cited By

View all
  • (2020)E-Voting System Based on Multiple Ballot CastingFourth International Congress on Information and Communication Technology10.1007/978-981-32-9343-4_9(89-97)Online publication date: 3-Jan-2020
  • (2018)Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic EncryptionProceedings of the 11th International Conference on Security of Information and Networks10.1145/3264437.3264473(1-6)Online publication date: 10-Sep-2018

Index Terms

  1. A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
    October 2017
    321 pages
    ISBN:9781450353038
    DOI:10.1145/3136825
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. .Net
    2. e-government
    3. e-voting
    4. symmetric encryption
    5. system model

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SIN '17
    SIN '17: Security of Information and Networks
    October 13 - 15, 2017
    Jaipur, India

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)E-Voting System Based on Multiple Ballot CastingFourth International Congress on Information and Communication Technology10.1007/978-981-32-9343-4_9(89-97)Online publication date: 3-Jan-2020
    • (2018)Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic EncryptionProceedings of the 11th International Conference on Security of Information and Networks10.1145/3264437.3264473(1-6)Online publication date: 10-Sep-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media