Advertisement

E-voting Authentication with QR-codes

  • Stefanie Falkner
  • Peter Kieseberg
  • Dimitris E. Simos
  • Christina Traxler
  • Edgar Weippl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Abstract

In this paper we propose an e-voting authentication scheme combined with QR-codes and visual cryptography. We focus on the usability, in order to supply voters with less technical experience with a usable scheme. The only requirement is that the user needs to handle a device containing a QR-code reader, most probably a smartphone. This approach is based on visual cryptography as the work horse: The e-voting passwords for authentication are encoded as QR-codes and later encrypted into shadow transparencies. Thus, the transparency by itself conveys no information but when the layers are combined, the secret password is revealed.

Keywords

QR-code e-voting usability visual cryptography visual secret sharing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Iso/iec 18004:2000 qr code bar code symbology specificationGoogle Scholar
  2. 2.
    Borchert, B., Reinhardt, K.: Applications of Visual Cryptography. In: Visual Cryptography and secret image sharing, pp. 329–350. CRC Press Taylor & Francis (2012)Google Scholar
  3. 3.
    Burton, C., Culnane, C., Heather, J., Peacock, T., Ryan, P.Y.A., Schneider, S., Srinivasan, S., Teague, V., Wen, R., Xia, Z.: Using pret a voter in victorian state elections. In: Proceedings of the 2012 International Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 2012, p. 1. USENIX Association, Berkeley (2012)Google Scholar
  4. 4.
    Cimato, S., Prsico, R.D., Santis, A.D.: Visual Cryptography for Color Images. In: Visual Cryptography and secret image sharing, pp. 32–56. CRC Press Taylor & Francis (2012)Google Scholar
  5. 5.
    Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  6. 6.
    Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  7. 7.
    Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc. (2003)Google Scholar
  8. 8.
    Jagdeep Verma, V.K.: A visual cryptographic technique to secure image shares. International Journal of Engineering Research and Applications 2, 1121–1125 (2012)Google Scholar
  9. 9.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  10. 10.
    Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for remote voting. In: Workshop on Human-Interaction and Security Systems (2003)Google Scholar
  11. 11.
    Shimizu, T., Isami, M., Terada, K., Ohyama, W., Kimura, F.: Color recognition by extended color space method for 64-color 2-d barcode. In: Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2011), pp. 259–262 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Stefanie Falkner
    • 1
    • 2
  • Peter Kieseberg
    • 1
  • Dimitris E. Simos
    • 1
  • Christina Traxler
    • 1
    • 2
  • Edgar Weippl
    • 1
  1. 1.SBA ResearchViennaAustria
  2. 2.School of Informatics, Communications and MediaUniversity of Applied Sciences Upper AustriaHagenbergAustria

Personalised recommendations