A secure voting system on a public network
نویسندگان
چکیده
We point out that the encryption process of [1, 2] is not invertible. This becomes evident through the following, illustrative, example. In accordance with Chang and Wu’s [1] protocol, let us assume that there are n eligible voters U1, . . . , Un, participating in the election. Further assume that the Voting Center chooses a prime number P, for example P 31, and a primitive element e 7 over GF(31), and publicizes them. Based on the above assumptions we describe the voting phase. The purpose of this phase is to support the casting of votes and the secure encryption and decryption of ballots. Assume that the Voting Center’s {private, public} key pair is ( x0, y0) (5, 5). Let the Voter’s voting strategy be Vi 6. In accordance with the Chang and Wu protocol, the following steps have to be performed:
منابع مشابه
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum’s work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make especially if the mail system cannot be tr...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملI&s Improved Anonymous Secure E-voting over a Network
In a democratic country voting is one of the most important activities. However, many eligible voters do not exercise their right simply because they do not want to visit a public booth where they can vote. In 1981, David Chaum first introduced the concept of electronic voting and attempted to overcome the problems associated with the traditional voting environment. Hereafter, Mu and Varadharaj...
متن کاملSecure Internet Voting on Limited Devices with Anonymized DSA Public Keys
This paper presents an Internet voting protocol, which is primarily designed for limited voting devices such as smart cards or mobile phones. The minimum requirement for these devices is the ability to compute one ElGamal encryption and one DSA signature in reasonable time. The protocol is based on an anonymization mechanism for DSA public keys, which can be installed on top of an existing DSA ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Networks
دوره 43 شماره
صفحات -
تاریخ انتشار 1997