Skip to main content

Electronic Voting Privacy Protection Scheme Based on Double Signature in Consortium Blockchain

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Abstract

Electronic voting can improve the efficiency, accuracy and fairness of voting, and save resources and costs. However, the identity privacy of voters may not be effectively protected during the counting process of third-party electronic voting. In order to solve the problems of transparency and identity privacy protection in electronic voting, this paper combines pseudonym mechanism and digital signature technology to propose a privacy protection scheme for double signature electronic voting based on Consortium blockchain. By introducing the Consortium Blockchain, the voting ciphertext is published on the Blockchain to realize the transparency of electronic voting and ensure the security of the voting; the introduction of the pseudonym mechanism can effectively protect the identity privacy of voters; the use of homomorphic encryption technology to realize ciphertext vote counting, it can effectively resist the internal attack of electronic voting; through double signature, that is, to sign the voting ciphertext and pseudonym to ensure the identity of the voter and the legitimacy of the vote. At the same time, a scoring mechanism is introduced to achieve more precise evaluation of candidates by voters, and the Bulletproof protocol is used to standardize the range of score. The electronic voting privacy protection scheme proposed in this paper can also satisfy multi-candidate voting and is applicable to various voting scenarios.

This work was supported by National Key R &D Program of China under Grant 2020YFB1005900, NSFC(Grant Nos. 62072051).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q.H.: Electionblock: an electronic voting system using blockchain and fingerprint authentication. In: 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C), pp. 123–129. IEEE (2021). https://doi.org/10.1109/ICSA-C52384.2021.00033

  2. Freitas, L., et al.: Homomorphic sortition-single secret leader election for PoS blockchains. Cryptology ePrint Archive (2023). https://doi.org/10.48550/arXiv.2206.11519

  3. Yang, Y., Zhao, Y., Zhang, Q., Ma, Y., Gao, Y.: Weighted electronic voting system with homomorphic encryption based on seal. Chin. J. Comput. 43(4), 711–723 (2020)

    Google Scholar 

  4. Saadeh, I.A., Abandah, G.A.: Investigating parallel implementations of electronic voting verification and tallying processes. In: 2017 European Conference on Electrical Engineering and Computer Science (EECS), pp. 70–75. IEEE (2017). https://doi.org/10.1109/EECS.2017.23

  5. Stan, I.-M., Barac, I.-C., Rosner, D.: Architecting a scalable e-election system using blockchain technologies. In: 2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1–6. IEEE (2021). https://doi.org/10.1109/RoEduNet54112.2021.9638303

  6. Peng, K., Boyd, C., Dawson, E.: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inform. Syst. Secur. (TISSEC) 10(2), 6-es (2007). https://doi.org/10.1145/1237500.1237502

  7. Specter, M.A., Koppel, J., Weitzner, D.: The ballot is busted before the blockchain: a security analysis of voatz, the first internet voting application used in \(\{\)US\(\}\). federal elections. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1535–1553 (2020)

    Google Scholar 

  8. Tian, H., Fu, L., He, J.: A simpler bitcoin voting protocol. In: Chen, X., Lin, D., Yung, M. (eds.) Inscrypt 2017. LNCS, vol. 10726, pp. 81–98. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75160-3_7

    Chapter  Google Scholar 

  9. Utah Green Party Hosts Dr. Stein. Elects new officers. using the following range voting system, the green party of utah elected a new slate of officers. SpinJ Corp, Boca Raton, FL, USA, Independent Political Rep (2017)

    Google Scholar 

  10. Rule twenty-two special rules for the visual effects award. five productions shall be selected using reweighted range voting to become the nominations for final voting for the visual effects award. In: 89th Annual Academy My Awards of Merit. Beverly Hills, CA, USA (2016)

    Google Scholar 

  11. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018). https://doi.org/10.1109/SP.2018.00020

  12. Meduza Moscow’s online voting system has some major vulnerabilities, allowing votes to be decrypted before the official count. 01-Jul-2020

    Google Scholar 

  13. Bartolucci, S., Bernat, P., Joseph, D.: SHARVOT: secret share-based voting on the blockchain. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 30–34 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenmin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, W., Li, W., Zhang, H. (2024). Electronic Voting Privacy Protection Scheme Based on Double Signature in Consortium Blockchain. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics