Skip to main content

Improved Scheme Securing Voting System for Elections

  • Conference paper
  • First Online:
  • 630 Accesses

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 9))

Abstract

In this paper, we provide an improved Electronic Voting System (EVS) for political and social elections based on known Cryptographic schemes. In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm which is based on Diffie-Hellman key exchange. We will use the ElGamal algorithm to generate and encrypt random keys for the voters. This scheme is designed in a way that the communication channels are anonymous and in the meantime privacy, eligibility and fairness are applied to the entire system. Encrypted receipt-free transactions are provided to the voters after they submit a vote successfully. After the voting completes the voters can check on voting online using the encrypted receipt, only to confirm their participation in the election. The voters will not be aware of the chosen candidate to prevent cheating and vote selling, common issues in elections these days. The name of the chosen candidate will be confidential. The proposed voting system efficiently gives the opportunity for people to vote via their own PCs/laptops, thus decreases the queues accumulated up at voting centers. In addition, it offers a highly dependable authentication approach by national ID or biometrically which leads to overcoming electoral fraud.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bargnani, A., Pieprzyk, J., Safavi, R.: A practical electronic voting protocol using threshold schemes. Centre for Computer Security Research, University of Wollongong, Australia (1994)

    Google Scholar 

  2. California Secretary of State Ad Hoc Touch screen Voting Task Force Report; from Caltech-MIT. Voting: Cal Tech-MIT Voting technology Project Report (2001). www.vote.caltech.edu/Reports

  3. Vu, D., Luong, T., Ho, T., Nguyen, C.: An efficient approach for electronic voting scheme without an authenticated channel. In: 2018 10th International Conference on Knowledge and Systems Engineering (KSE), Ho Chi Minh City, pp. 376–381 (2018)

    Google Scholar 

  4. Halderman, J.A., Teague, V.: The New South Wales iVote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R., Wikström, D. (eds.) E-Voting and Identity, Vote-ID. Lecture Notes in Computer Science, vol. 9269. Springer, Cham (2015)

    Google Scholar 

  5. Huszti, A.: A secure electronic voting scheme. Period. Polytech. Electr. Eng. (Arch.) 51(3–4), 141–146 (2007). https://doi.org/10.3311/pp.ee.2007-3-4.08

    Article  Google Scholar 

  6. Kim, K., Hong, D.: Electronic voting system using mobile terminal. World Acad. Sci. Eng. Technol. 33–37 (2007)

    Google Scholar 

  7. Wang, K.-H., Mondal, S.K., Chan, K., Xie, X.: A review of contemporary e-voting: requirements, technology, systems and usability. Data Sci. Pattern Recogn. 1(1), 31–47 (2017)

    Google Scholar 

  8. Kumar, M., Katti, C.P., Saxena, P.C.: A secure anonymous E-voting system using identity-based blind signature scheme. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds.) Information Systems Security, ICISS. Lecture Notes in Computer Science, vol. 10717. Springer, Cham (2017)

    Google Scholar 

  9. Nassar, M., Malluhi, Q., Khan, T.: A scheme for three-way secure and verifiable E-voting. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, pp. 1–6 (2018). https://doi.org/10.1109/aiccsa.2018.8612810

  10. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) Proceedings of the 19th international conference on Theory and application of cryptographic techniques (EUROCRYPT 2000), pp. 539–556. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Meyer, M., Smyth, B.: Exploiting re-voting in the Helios election system. Inf. Process. Lett. 143, 14–19 (2019). https://doi.org/10.1016/j.ipl.2018.11.001. ISSN 0020-0190

    Article  MathSciNet  Google Scholar 

  12. Nair, D.G., Binu, V.P., Santhosh Kumar, G.: An improved E-voting scheme using secret sharing based secure multi-party computation. arXiv e-prints, reprint -1502.07469 (2015)

    Google Scholar 

  13. Cetinkaya, O., Doganaksoy, A.: A practical verifiable e-voting protocol for large scale elections over a network. In: The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, pp. 432–442 (2007)

    Google Scholar 

  14. Obaidat, M.S., Maitra, T., Giri, D.: Protecting the integrity of elections using biometrics. In: Obaidat, M., Traore, I., Woungang, I. (eds.) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)

    Chapter  Google Scholar 

  15. Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: a non-interactivereceipt-free electronic voting scheme. In: 23rd ACM Conference on Computer and communications security (CCS 2016), Vienna, Austria, October 2016. https://doi.org/10.1145/2976749.2978337

  16. Royal-Holloway, University of London Egham, Surrey TW20-0EX – England. Technical report RHULMA (2006). http://www.rhul.ac.uk/mathematics/techreports

  17. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–90 (1981)

    Article  Google Scholar 

  18. Aditya., R., Lee, B., Boyd, C., Dawson, E.: An efficient mixnet-based voting scheme providing receipt-freeness. In: Proceedings of the International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, 30 August–1 September 2004, vol. 3184, pp. 152–161 (2004)

    Chapter  Google Scholar 

  19. Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in Mixnet-based voting protocols. In: Proceedings of the International Conference on Information Security and Cryptology, Seoul, Korea, 27–28 November 2003, vol. 2971, pp. 245–258 (2003)

    Google Scholar 

  20. Araújo, R., Barki, A., Brunet, S., Traoré, J.: Remote electronic voting can be efficient, verifiable and coercion-resistant. In: Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Christ Church, Barbados, 26 February 2016, pp. 224–232. Springer, Heidelberg (2016)

    Chapter  Google Scholar 

  21. García, D.L.: A flexible e-voting scheme for debate tools. Comput. Secure. 56, 50–62 (2016)

    Article  Google Scholar 

  22. Chow, S., Liu, J., Wong, D.: Robust receipt-free election system with ballot secrecy and verifiability. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 8–11 February 2008, pp. 81–94 (2008)

    Google Scholar 

  23. Ohkubo, M., Miura, F., Abe, M., Fujioka, A., Okamoto, T.: An improvement on a practical secret voting scheme. In Proceedings of the 2nd International Workshop on Information Security (ISW 1999), Kuala Lumpur, Malaysia, 6–7 November 1999, pp. 225–234 (1999)

    Google Scholar 

  24. Benaloh, J.: Verifiable secret ballot elections. Ph.D. thesis, Yale University, New Haven, CT, USA, 1987

    Google Scholar 

  25. Adewole, A.P., Sodiya, A.S., Arowolo, O.A.: A receipt-free multi-authority e-voting system. Int. J. Comput. Appl. 30, 15–23 (2011)

    Google Scholar 

  26. Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1999), Santa Barbara, CA, USA, 15–19 August 1999, pp. 148–164 (1999)

    Google Scholar 

  27. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  28. Iftene, S.: General secret sharing based on the Chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67–84 (2007)

    Article  MathSciNet  Google Scholar 

  29. Lee, B., Kim, K.: Receipt-free electronic voting through collaboration of voter and honest verifier. In: Proceedings of the JW-ISC, Naha, Japan, 25–26 January 2000, pp. 101–108 (2000)

    Google Scholar 

  30. Chevallier-Mames, B., Fouque, P.A., Pointcheval, D., Stern, J., Traoré, J.: On some incompatible properties of voting schemes. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.A., Benaloh, J. (eds.) Towards Trustworthy Elections, pp. 191–199. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  31. Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: a systems perspective. In: Proceedings of the 14th Conference on USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005, vol. 5, pp. 33–50 (2005)

    Google Scholar 

  32. Srivastava, G., Dwivedi, A. D., Singh, R.: PHANTOM protocol as the new crypto-democracy. In: IFIP International Conference on Computer Information Systems and Industrial Management, September 2018, pp. 499–509. Springer, Cham (2018)

    Chapter  Google Scholar 

  33. Srivastava, G., Dwivedi, A.D., Singh, R.: Crypto-democracy: a decentralized voting scheme using blockchain technology. In: ICETE (2), pp. 674–679, July 2018. By-the authors. Submitted-to-Journal-Not Specified for-possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (2019). http://creativecommons.org/licenses/by/4.0/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jabbar El-Gburi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El-Gburi, J. (2020). Improved Scheme Securing Voting System for Elections. In: Jain, L., Peng, SL., Alhadidi, B., Pal, S. (eds) Intelligent Computing Paradigm and Cutting-edge Technologies. ICICCT 2019. Learning and Analytics in Intelligent Systems, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-030-38501-9_45

Download citation

Publish with us

Policies and ethics