Security Considerations in e-Cognocracy

  • Joan Josep Piles
  • José Luis Salazar
  • José Ruíz
  • José María Moreno-Jiménez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4263)


E-cognocracy [1,2,3] is a cognitive democracy that combines both representative and participative democracy with two main objectives: (i) to overcome some of the problems associated with the traditional democratic system (participation, transparency and control) and (ii) to extract and socially share knowledge related with the scientific resolution of high complexity problems associated with the governance of society. E-cognocracy uses the democratic system as a catalyst for the vital or cognitive process characteristic of living systems, the multicriteria techniques as the methodological aid and the Internet as the communication and participation support. To capture the decision makers’ preferences and to share the knowledge related with the scientific resolution of the public decision making problems, the e-voting process of e-cognocracy has some characteristics that have not been covered by traditional e-voting systems. In this paper, we present the necessary modifications in the classical e-voting methods to deal with one of these properties: the linkage among rounds.


Vote System Blind Signature Homomorphic Encryption Democratic System Vote Process 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Moreno-Jiménez, J.M., Polasek, J.M.: e-Democracy and knowledge. A multicriteria framework for the new democratic era. Journal of Multicriteria Decision Analysis 12, 163–176 (2003)CrossRefGoogle Scholar
  2. 2.
    Moreno-Jiménez, J.M., Polasek, J.M.: e-Cognocracy and the participation of immigrants in e-governance. In: TED Conference on e-government 2005. Electronic democracy: The challenge ahead. Schriftenreihe Informatik, vol. 13, pp. 18–26. University Rudolf Trauner-Verlag (2005)Google Scholar
  3. 3.
    Kersten, G.E.: e-democracy and participatory decision processes: lessons from e-negotiation experiments. Journal of Multi-Criteria Decision Analysis 12(2-3), 127–143 (2003)CrossRefGoogle Scholar
  4. 4.
    Roberts, N.: Public Deliberation in an Age of Direct Citizen Participation. The American Review of Public Administration 34(4), 315–353Google Scholar
  5. 5.
    Moreno-Jiménez, J.: Nueva sociedad, nueva democracia. Estudios de economía aplicada (1), 559–581 (2006)Google Scholar
  6. 6.
    Lotov, A.: Internet tools for supporting of lay stakeholders in the framework of the democratic paradigm of environmental decision making. Journal of Multi-Criteria Decision Analysis 12(2-3), 145–163 (2003)CrossRefGoogle Scholar
  7. 7.
    Insa, R., Holgado, D., Moreno, J., Multicriteria, R.: e-negotiation systems for e-democracy. Journal of Multi-Criteria Decision Analysis 12(2-3), 213–218 (2003)CrossRefGoogle Scholar
  8. 8.
    Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: STOC 1994: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pp. 544–553. ACM Press, New York (1994)CrossRefGoogle Scholar
  9. 9.
    Cranor, L.F., Cytron, R.K.: Design and implementation of a practical security-conscious electronic polling system. Technical Report WUCS-96-02, Washington University (1996)Google Scholar
  10. 10.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology: Proceedings of Crypto 1982, pp. 199–204 (1982)Google Scholar
  11. 11.
    Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme (extended abstract). In: FOCS, pp. 372–382 (1985)Google Scholar
  12. 12.
    Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRefGoogle Scholar
  13. 13.
    Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  14. 14.
    Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Tsang, P.P., Wei, V.K.: Short linkable ring signatures for e-voting, e-cash and attestation. Cryptology ePrint Archive, Report 2004/281 (2004),
  16. 16.
    Riera, A., Borrell, J.R.J.: Efficient construction of vote-tags to allow open objection to the tally in electronic elections. Inf. Process. Lett. 75(5), 211–215 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Joan Josep Piles
    • 1
  • José Luis Salazar
    • 1
  • José Ruíz
    • 1
  • José María Moreno-Jiménez
    • 2
  1. 1.Departamento de Ingeniería Electrónica y de ComunicacionesUniversidad de Zaragoza 
  2. 2.Grupo Decisión Multicriterio ZaragozaUniversidad de Zaragoza 

Personalised recommendations