A Practical Approach to a Reliable Electronic Election

  • Kwangwoo Lee
  • Yunho Lee
  • Seungjoo Kim
  • Dongho Won
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5593)


A receipt used for electronic voting is a key component of voting techniques designed to provide voter verifiability. In this paper, we propose electronic voting scheme involving issuing a receipt based on the cut-and-choose mechanism. Compared with Chaum et al.’s scheme[3], this scheme does not require large amounts of physical ballots and trust assumptions on tellers. Furthermore, it is as efficient and user-friendly as any of the existing electronic voting schemes issuing receipts described in the relevant literature. They only require simple comparisons between the screen and the receipt during voter’s voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.


electronic voting paper receipt cut-and-choose 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Evans, D., Paul, N.: Election Security: Perception and Reality. IEEE Security and Privacy Magazine 2(1), 24–31 (2004)CrossRefGoogle Scholar
  2. 2.
    Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security and Privacy Magazine 2(1), 38–47 (2004)CrossRefGoogle Scholar
  3. 3.
    Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  5. 5.
    Ryan, P.Y.A., Peacock, T.: A Threat Analysis of Pret a Voter. In: Proc. of IAVoSS Workshop On Trustworthy Elections (WOTE 2006), pp. 101–117 (2006)Google Scholar
  6. 6.
    Mercuri, R.: Rebecca Mercuri’s Statement on Electronic Voting (2001),
  7. 7.
    Mercuri, R.: A Better Ballot Box. IEEE Spectrum Online, 46–50 (October 2002)Google Scholar
  8. 8.
    Neff, C.A., Adler, J.: Verifiable e-Voting: Indisputable Electronic Elections at Polling Places, VoteHere Inc (2003),
  9. 9.
    Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical, Voter-Verifiable Election Scheme, Technical Report CS-TR-880, University of Newcastle upon Tyne (2004)Google Scholar
  10. 10.
    Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer System Sciences (JCSS) 28(2), 270–299 (1984)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Tsiounis, Y., Yung, M.: On the Security of ElGamal Based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  12. 12.
    Blum, L., Blum, M., Shub, M.: A Simple Secure Unpredictable Pseudo-random Number Generator. SIAM Journal on Computing 15, 364–383 (1986)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Ryan, P.Y.A., Peacock, T.: Pret a Voter: A Systems Perspective, NCL CS Tech Report 929 (September 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kwangwoo Lee
    • 1
  • Yunho Lee
    • 1
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Information Security Group, School of Information and Communication EngineeringSungkyunkwan UniversitySuwon-siKorea

Personalised recommendations