Abstract
In this paper, we provide an improved Electronic Voting System (EVS) for political and social elections based on known Cryptographic schemes. In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm which is based on Diffie-Hellman key exchange. We will use the ElGamal algorithm to generate and encrypt random keys for the voters. This scheme is designed in a way that the communication channels are anonymous and in the meantime privacy, eligibility and fairness are applied to the entire system. Encrypted receipt-free transactions are provided to the voters after they submit a vote successfully. After the voting completes the voters can check on voting online using the encrypted receipt, only to confirm their participation in the election. The voters will not be aware of the chosen candidate to prevent cheating and vote selling, common issues in elections these days. The name of the chosen candidate will be confidential. The proposed voting system efficiently gives the opportunity for people to vote via their own PCs/laptops, thus decreases the queues accumulated up at voting centers. In addition, it offers a highly dependable authentication approach by national ID or biometrically which leads to overcoming electoral fraud.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bargnani, A., Pieprzyk, J., Safavi, R.: A practical electronic voting protocol using threshold schemes. Centre for Computer Security Research, University of Wollongong, Australia (1994)
California Secretary of State Ad Hoc Touch screen Voting Task Force Report; from Caltech-MIT. Voting: Cal Tech-MIT Voting technology Project Report (2001). www.vote.caltech.edu/Reports
Vu, D., Luong, T., Ho, T., Nguyen, C.: An efficient approach for electronic voting scheme without an authenticated channel. In: 2018 10th International Conference on Knowledge and Systems Engineering (KSE), Ho Chi Minh City, pp. 376–381 (2018)
Halderman, J.A., Teague, V.: The New South Wales iVote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R., Wikström, D. (eds.) E-Voting and Identity, Vote-ID. Lecture Notes in Computer Science, vol. 9269. Springer, Cham (2015)
Huszti, A.: A secure electronic voting scheme. Period. Polytech. Electr. Eng. (Arch.) 51(3–4), 141–146 (2007). https://doi.org/10.3311/pp.ee.2007-3-4.08
Kim, K., Hong, D.: Electronic voting system using mobile terminal. World Acad. Sci. Eng. Technol. 33–37 (2007)
Wang, K.-H., Mondal, S.K., Chan, K., Xie, X.: A review of contemporary e-voting: requirements, technology, systems and usability. Data Sci. Pattern Recogn. 1(1), 31–47 (2017)
Kumar, M., Katti, C.P., Saxena, P.C.: A secure anonymous E-voting system using identity-based blind signature scheme. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds.) Information Systems Security, ICISS. Lecture Notes in Computer Science, vol. 10717. Springer, Cham (2017)
Nassar, M., Malluhi, Q., Khan, T.: A scheme for three-way secure and verifiable E-voting. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, pp. 1–6 (2018). https://doi.org/10.1109/aiccsa.2018.8612810
Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) Proceedings of the 19th international conference on Theory and application of cryptographic techniques (EUROCRYPT 2000), pp. 539–556. Springer, Heidelberg (2000)
Meyer, M., Smyth, B.: Exploiting re-voting in the Helios election system. Inf. Process. Lett. 143, 14–19 (2019). https://doi.org/10.1016/j.ipl.2018.11.001. ISSN 0020-0190
Nair, D.G., Binu, V.P., Santhosh Kumar, G.: An improved E-voting scheme using secret sharing based secure multi-party computation. arXiv e-prints, reprint -1502.07469 (2015)
Cetinkaya, O., Doganaksoy, A.: A practical verifiable e-voting protocol for large scale elections over a network. In: The Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, pp. 432–442 (2007)
Obaidat, M.S., Maitra, T., Giri, D.: Protecting the integrity of elections using biometrics. In: Obaidat, M., Traore, I., Woungang, I. (eds.) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham (2019)
Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: a non-interactivereceipt-free electronic voting scheme. In: 23rd ACM Conference on Computer and communications security (CCS 2016), Vienna, Austria, October 2016. https://doi.org/10.1145/2976749.2978337
Royal-Holloway, University of London Egham, Surrey TW20-0EX – England. Technical report RHULMA (2006). http://www.rhul.ac.uk/mathematics/techreports
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–90 (1981)
Aditya., R., Lee, B., Boyd, C., Dawson, E.: An efficient mixnet-based voting scheme providing receipt-freeness. In: Proceedings of the International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, 30 August–1 September 2004, vol. 3184, pp. 152–161 (2004)
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in Mixnet-based voting protocols. In: Proceedings of the International Conference on Information Security and Cryptology, Seoul, Korea, 27–28 November 2003, vol. 2971, pp. 245–258 (2003)
Araújo, R., Barki, A., Brunet, S., Traoré, J.: Remote electronic voting can be efficient, verifiable and coercion-resistant. In: Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Christ Church, Barbados, 26 February 2016, pp. 224–232. Springer, Heidelberg (2016)
García, D.L.: A flexible e-voting scheme for debate tools. Comput. Secure. 56, 50–62 (2016)
Chow, S., Liu, J., Wong, D.: Robust receipt-free election system with ballot secrecy and verifiability. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 8–11 February 2008, pp. 81–94 (2008)
Ohkubo, M., Miura, F., Abe, M., Fujioka, A., Okamoto, T.: An improvement on a practical secret voting scheme. In Proceedings of the 2nd International Workshop on Information Security (ISW 1999), Kuala Lumpur, Malaysia, 6–7 November 1999, pp. 225–234 (1999)
Benaloh, J.: Verifiable secret ballot elections. Ph.D. thesis, Yale University, New Haven, CT, USA, 1987
Adewole, A.P., Sodiya, A.S., Arowolo, O.A.: A receipt-free multi-authority e-voting system. Int. J. Comput. Appl. 30, 15–23 (2011)
Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1999), Santa Barbara, CA, USA, 15–19 August 1999, pp. 148–164 (1999)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Iftene, S.: General secret sharing based on the Chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67–84 (2007)
Lee, B., Kim, K.: Receipt-free electronic voting through collaboration of voter and honest verifier. In: Proceedings of the JW-ISC, Naha, Japan, 25–26 January 2000, pp. 101–108 (2000)
Chevallier-Mames, B., Fouque, P.A., Pointcheval, D., Stern, J., Traoré, J.: On some incompatible properties of voting schemes. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.A., Benaloh, J. (eds.) Towards Trustworthy Elections, pp. 191–199. Springer, Heidelberg (2010)
Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: a systems perspective. In: Proceedings of the 14th Conference on USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005, vol. 5, pp. 33–50 (2005)
Srivastava, G., Dwivedi, A. D., Singh, R.: PHANTOM protocol as the new crypto-democracy. In: IFIP International Conference on Computer Information Systems and Industrial Management, September 2018, pp. 499–509. Springer, Cham (2018)
Srivastava, G., Dwivedi, A.D., Singh, R.: Crypto-democracy: a decentralized voting scheme using blockchain technology. In: ICETE (2), pp. 674–679, July 2018. By-the authors. Submitted-to-Journal-Not Specified for-possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (2019). http://creativecommons.org/licenses/by/4.0/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
El-Gburi, J. (2020). Improved Scheme Securing Voting System for Elections. In: Jain, L., Peng, SL., Alhadidi, B., Pal, S. (eds) Intelligent Computing Paradigm and Cutting-edge Technologies. ICICCT 2019. Learning and Analytics in Intelligent Systems, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-030-38501-9_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-38501-9_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38500-2
Online ISBN: 978-3-030-38501-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)