Skip to main content
Log in

Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In this paper, an ad-hoc public-key cryptosystem recently proposed to implement a general countermeasure to relation attacks in mix-based e-voting is shown to be weak in the sense that the secret key is easily obtained from public-key parameters. The required measure to fix the previous flaw is analyzed and proven to lead to an unsecure system, so that we recommend the referred cryptosystem to be discarded.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Pfitzmann, B.: Breaking an efficient anonymous channel. In: Lecture Notes in Computer Science, vol. 950, pp. 332–340. Springer, Berlin (1995)

  2. Chaum D.: Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  3. DeMillo R., Merritt M.: Protocols for data security. Computer 16(2), 39–51 (1983)

    Article  Google Scholar 

  4. Peng K., Dawson E., Bao F.: Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Secur. 10, 33–47 (2011)

    Article  Google Scholar 

  5. Katz, J.: Efficient and non-malleable proofs of plaintext knowledge and applications. In: Lecture Notes in Computer Science, vol. 2656, pp. 211–228. Springer, Berlin (2003)

  6. Wikström, D.: Simplified submission of inputs to protocols. In: Lecture Notes in Computer Science, vol. 5229, pp. 293–308, Springer, Berlin (2008)

  7. Peng K.: A general and efficient countermeasure to relation attacks in mix-based e-voting. Int. J. Inf. Secur. 10, 49–60 (2011)

    Article  Google Scholar 

  8. Mao, W.: Cryptanalysis in prime order subgroups of \({\mathbb{Z}^*_n}\) . In: Lecture Notes in Computer Science, vol. 1514, pp. 214–226. Springer, Berlin (1998)

  9. Joye M.: Cryptanalysis of a pay-as-you-watch system. Inf. Proc. Lett. 88(3), 119–120 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  10. Domingo-Ferrer, J., Martínez-Ballesté, A., Sebé, F.: MICROCAST: smart card based (micro)pay-per-view for multicast services. In: Proceedings of the Fifth Smart Card Research and Advanced Applications Conference (CARDIS’02), pp. 125–134. Usenix Association, Berkeley (2002)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesc Sebé.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Miret, J.M., Sebé, F. Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks. Int. J. Inf. Secur. 10, 387–389 (2011). https://doi.org/10.1007/s10207-011-0145-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-011-0145-2

Keywords

Navigation