TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections

  • Jordi Pujol-Ahulló
  • Roger Jardí-Cedó
  • Jordi Castellà-Roca
  • Oriol Farràs
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6888)


The private key of electronic elections is a very critical piece of information that, with an incorrect or improper use, may disrupt the elections results. To enforce the privacy and security of the private key, secret sharing schemes (or threshold schemes) are used to generate a distributed key into several entities. In this fashion, a threshold of at least t out of the n entities will be necessary to decrypt votes. We study in this work the feasibility of developing ElGamal cryptosystem and Shamir’s secret sharing scheme into JavaCards, whose API gives no support for it.


asymmetric cryptography secret sharing scheme JavaCards multi-authority election scheme e-voting 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Koninklijke Philips Electronics N.V.: (2003) Jcop 21 v2.2 72kb spreadsheet (2004),,
  2. 2.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981), CrossRefGoogle Scholar
  3. 3.
    Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997), CrossRefGoogle Scholar
  4. 4.
    El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  5. 5.
    Naccache, D., M’Raïhi, D.: Cryptographic smart cards. IEEE Micro 16(3), 14–24 (1996), CrossRefGoogle Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Oracle: Introduction to java card 3.0 specifications (2011),
  10. 10.
    Renaudin, M., Bouesse, F., Proust, P., Tual, J.P., Sourgen, L., Germain, F.: High security smartcards. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2004, vol. 1, p. 10228. IEEE Computer Society, Washington, DC (2004), Google Scholar
  11. 11.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), pp. 106–110. IEEE, London (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jordi Pujol-Ahulló
    • 1
  • Roger Jardí-Cedó
    • 1
  • Jordi Castellà-Roca
    • 1
  • Oriol Farràs
    • 1
  1. 1.Departament d’Enginyeria en Informàtica i MatemàtiquesTarragonaSpain

Personalised recommendations