A Design of Practical Electronic Voting Protocol

  • ShiJie Guan
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 149)


voting behavior in modern democratic society is a frequently occurring behaviors, electronic voting is always used. However there are some defects in existed electronic voting protocols. This paper is aim to introduce a few basic properties that the secure electronic voting protocol should have, then design a based on public key (double key),blind signature and ensure the password technology to realize the electronic voting protocol, the protocol has high security ,it is very suitable for large-scale election system.


cryptography electronic voting blind signature bit assurance 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM (24), 84–88 (1981)CrossRefGoogle Scholar
  2. 2.
    Demillo, R., Merritt, M.: Protocols for Data Security. Computer 02, 39 (1983)CrossRefGoogle Scholar
  3. 3.
    Benaloh, J., Tuinstra, D.: Receipt-free Secret-ballot Elections. In: Proccedings of the Twentysixth Annual ACM Symposium on the Theory of Computing, pp. 544–553. ACM Press, New York (1994)Google Scholar
  4. 4.
    Iverson, K.R.: A cryptographic scheme for computerized general elections. LNCS 330, 405–419 (1991)Google Scholar
  5. 5.
    Sako, K.: Electronic voting system with objection to the center. In: Proccedings of the Symposium on Cryptography and Information Security, Tateshina, pp. 92–130 (1992)Google Scholar
  6. 6.
    Chen, X., Wang, Y.: Based on anonymous communication channel secure electronic voting scheme. Chinese Journal of Electronics 31(3), 390–393 (2003)Google Scholar
  7. 7.
    Chaum, D.: Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 177–182. Springer, Heidelberg (1988)CrossRefGoogle Scholar
  8. 8.
    Nurmi, H., Salomaa, A., Santean, L.: Secret Ballot Elections in Computer Networks. Computers & Security 36(10), 553 (1991)CrossRefGoogle Scholar
  9. 9.
    Iversen, K.R.: A Cryptographic Scheme for Computerized General Elections. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 405–419. Springer, Heidelberg (1992)Google Scholar
  10. 10.
    Sako, K., Kilian, J.: Secure Voting Using Partially Compatible Homomorphisms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 411–424. Springer, Heidelberg (1994)Google Scholar
  11. 11.
    Niemi, V., Renvall, A.: How to Prevent Buying of Votes in Computer Elections. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 141–148. Springer, Heidelberg (1995)Google Scholar
  12. 12.
    Fnjioka, A., Okaloma, T., Ohla, K.: A Pracaic:a Secret voting Scaieme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)Google Scholar
  13. 13.
    Thuringiensis, Lu, N., Zhu, Y.: No one needs a central mechanism of electronic voting protocol. Computer Engineering 30(11), 96–97 (2004)Google Scholar
  14. 14.
    Gao, H., Wang, Y., Wang, J.: A net electronic voting scheme based on Mix. Chinese Journal of Electronics 32(6), 1047–1049 (2004)Google Scholar
  15. 15.
    Chen, X., Wang, J., Wang, Y.: Based on receipt-free electronic voting. Chinese Journal of Computers 26(5), 557–562 (2003)Google Scholar
  16. 16.
    Xie, J., Liu, H.: Based blind group signature secret sharing, and the new safety electronic election model. Microcomputer and Application (9), 38–42 (2000)Google Scholar
  17. 17.
    Shengli, L., Bo, Y., Yumin, W.: Based on elliptic curve cryptosystem voting protocol. Journal of Electronics 22(1), 84–89 (2000)Google Scholar
  18. 18.
    Qi, D., Shuling, S.: The electronic voting research. Computer Application 18(4), 23–25 (1998)Google Scholar
  19. 19.
    Zhang, M.: Online voting technology security. The Computer Age (3), 38–39 (2004)Google Scholar
  20. 20.
    Cheng, C., Cheng, W., Kamfai: The electronic voting system security problem (English). Computer Engineering 25(special issue), 61–64 (1999)Google Scholar
  21. 21.
    Liu, J., Fu, X., Cheng, G.: Electronic voting security and application prospects. Computer Security 12, 24–26 (2004)Google Scholar
  22. 22.
    Cranor, L.F., Cytron, R.K.: Design and implementation of a security-conscious electronic polling system. Washington University: Technical Report WUCS-96-02 (1996)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Shenyang Ligong UniversityShenyangChina

Personalised recommendations