Abstract
A receipt used for electronic voting is a key component of voting techniques designed to provide voter verifiability. In this paper, we propose electronic voting scheme involving issuing a receipt based on the cut-and-choose mechanism. Compared with Chaum et al.’s scheme[3], this scheme does not require large amounts of physical ballots and trust assumptions on tellers. Furthermore, it is as efficient and user-friendly as any of the existing electronic voting schemes issuing receipts described in the relevant literature. They only require simple comparisons between the screen and the receipt during voter’s voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.
This research was supported by the Ministry of Knowledge Economy, Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2009-(C1090-0902-0016)).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Evans, D., Paul, N.: Election Security: Perception and Reality. IEEE Security and Privacy Magazine 2(1), 24–31 (2004)
Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy Magazine 2(1), 38–47 (2004)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ryan, P.Y.A., Peacock, T.: A Threat Analysis of Pret a Voter. In: Proc. of IAVoSS Workshop On Trustworthy Elections (WOTE 2006), pp. 101–117 (2006)
Mercuri, R.: Rebecca Mercuri’s Statement on Electronic Voting (2001), http://www.notablesoftware.com/RMstatement.html
Mercuri, R.: A Better Ballot Box. IEEE Spectrum Online, 46–50 (October 2002)
Neff, C.A., Adler, J.: Verifiable e-Voting: Indisputable Electronic Elections at Polling Places, VoteHere Inc (2003), http://www.votehere.net/vhti/documentation/VHVHTiWhitePaper.pdf
Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical, Voter-Verifiable Election Scheme, Technical Report CS-TR-880, University of Newcastle upon Tyne (2004)
Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer System Sciences (JCSS) 28(2), 270–299 (1984)
Tsiounis, Y., Yung, M.: On the Security of ElGamal Based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998)
Blum, L., Blum, M., Shub, M.: A Simple Secure Unpredictable Pseudo-random Number Generator. SIAM Journal on Computing 15, 364–383 (1986)
Ryan, P.Y.A., Peacock, T.: Pret a Voter: A Systems Perspective, NCL CS Tech Report 929 (September 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K., Lee, Y., Kim, S., Won, D. (2009). A Practical Approach to a Reliable Electronic Election. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02457-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-02457-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02456-6
Online ISBN: 978-3-642-02457-3
eBook Packages: Computer ScienceComputer Science (R0)