Abstract
Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schemes do not seem to meet the requirement of delegation. For example, a stockholder may want to assign some other person in the company to vote by using a warrant, and the system should provide such service. In this paper, the authors propose a novel e-voting scheme called the proxy e-voting scheme that has the ability to delegate a proxy to vote. The proxy e-voting scheme can satisfy all the requirements we bring up. As a result, the scheme not only can be easily implemented but also has less computational cost for voters to cast the ballots.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chaum, C.: Untracable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–88 (1981)
Chaum, C.: Blind signatures system. Adv. Cryptol. CRYPTO’83, 153–156 (1983)
Chaum, C.: The dinning cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1, 65–75 (1988)
Chen, W., Wu, Y., Pan, F., Lei, F.: An efficient electronic voting scheme based on quadratic residue. In: Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 647–649 (2009)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: Cryptanalysis on Muvaradharajan’s e-voting schemes. Appl. Math. Comput. 139, 525–530 (2003)
Dai, J.Z., Yang, X.H., Dong, J.X.: A privacy-protecting proxy signature scheme and its application. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 203–206 (2004)
Das, M.L., Saxena, A., Phatak, D.B.: Proxy signature scheme with effective revocation using bilinear pairings. Int. J. Netw. Sec. 4, 312–317 (2007)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31, 469–472 (1985)
Flonta, S., Miclea, L.C., Enyedi, S.: Electronic vote scheme based on ring signature. In: Proceedings of the IEEE International Conference on Automation, Quality, and Testing Robotics, pp. 1–3 (2009)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for largescale elections. Adv. Cryptol. AUSCRYPT’92, 244–251 (1993)
Gallegos-Garcia, G., Gomez-Cardenas R., Salinas, R.M., Duchen-Sanchez, G.I.: A new and secure electronic voting protocol based on bilinear pairings. In: Proceedings of the International Conference on Electronics, Communications, and Computer, pp. 240–244 (2009)
Gallegos-Garcia, G., Gomez-Cardenas R., Salinas, R.M., Duchen-Sanchez, G.I.: Electronic voting using identity based cryptography. In: Proceedings of the Fourth International Conference on Digital Society, pp. 31–36 (2010)
Hwang, M.S., Lee, C.C., Lai, Y.C.: An untraceable blind signature scheme. IEICE Transactions on Fundamentals on Electronics, Communications and Computer Science, vol. E86-A, pp. 1902–1906 (2003)
Juang, W.S., Lei, C.L.: A secure and practical electronic voting scheme for real world environments. IEICE Trans. Fundam. E80-A, 64–71 (1997)
Lin, I.C., Hwang, M.S., Chang, C.C.: Security enhancement for anonymous secure e-voting over a network. Comput. Stand. Interfaces 25, 131–139 (2003)
Lu, E.J., Huang, C.J.: A time-stamping proxy signature scheme using time-stamping service. Int. J. Newt. Sec. 2, 43–51 (2006)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1355–1360 (1996)
Mu, Y., Varadharajan, V.: Anonymous secure e-voting over a network. In: Proceedings of the 14th Annual Computer Security Application Conference, CAC-SAC’98, 2936–2939 (1998)
Sako, K.: Electronic voting schemes allowing open objection to the tally. IEICE Trans. Fundam. E77-A, 24–33 (1994)
Tan, Z.W.: Improvement on nominative proxy signature schemes. Int J. Netw. Sec. 7, 175–180 (2008)
Wang, S., Fan, H., Cui, G.: A proxy blind signature schemes based on DLP and applying in e-voting. In: Proceedings of the 7th International Conference on Electroni Commerce, pp. 641–645 (2005)
Yun, S.H., Lee, S.J.: An electronic voting scheme based on undeniable blind signature scheme. In: Proceedings of the 37th IEEE Carnahan Conference on Security, pp. 163–167 (2003)
Acknowledgments
This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC 100-2221-E-030-015 and 100-2218-E-164-002.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dortdrecht
About this paper
Cite this paper
Lee, CC., Chen, TY., Lin, SC., Hwang, MS. (2012). A New Proxy Electronic Voting Scheme Based on Proxy Signatures. In: J. (Jong Hyuk) Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 164. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4516-2_1
Download citation
DOI: https://doi.org/10.1007/978-94-007-4516-2_1
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-4515-5
Online ISBN: 978-94-007-4516-2
eBook Packages: EngineeringEngineering (R0)