A New Proxy Electronic Voting Scheme Based on Proxy Signatures

  • Cheng-Chi Lee
  • Te-Yu Chen
  • Shu-Chen Lin
  • Min-Shiang Hwang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 164)


Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schemes do not seem to meet the requirement of delegation. For example, a stockholder may want to assign some other person in the company to vote by using a warrant, and the system should provide such service. In this paper, the authors propose a novel e-voting scheme called the proxy e-voting scheme that has the ability to delegate a proxy to vote. The proxy e-voting scheme can satisfy all the requirements we bring up. As a result, the scheme not only can be easily implemented but also has less computational cost for voters to cast the ballots.


Data security Electronic voting ElGamal cryptosystem Proxy e-voting 



This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC 100-2221-E-030-015 and 100-2218-E-164-002.


  1. 1.
    Chaum, C.: Untracable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–88 (1981)CrossRefGoogle Scholar
  2. 2.
    Chaum, C.: Blind signatures system. Adv. Cryptol. CRYPTO’83, 153–156 (1983)Google Scholar
  3. 3.
    Chaum, C.: The dinning cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1, 65–75 (1988)MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Chen, W., Wu, Y., Pan, F., Lei, F.: An efficient electronic voting scheme based on quadratic residue. In: Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 647–649 (2009)Google Scholar
  5. 5.
    Chien, H.Y., Jan, J.K., Tseng, Y.M.: Cryptanalysis on Muvaradharajan’s e-voting schemes. Appl. Math. Comput. 139, 525–530 (2003)MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Dai, J.Z., Yang, X.H., Dong, J.X.: A privacy-protecting proxy signature scheme and its application. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 203–206 (2004)Google Scholar
  7. 7.
    Das, M.L., Saxena, A., Phatak, D.B.: Proxy signature scheme with effective revocation using bilinear pairings. Int. J. Netw. Sec. 4, 312–317 (2007)Google Scholar
  8. 8.
    ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31, 469–472 (1985)Google Scholar
  9. 9.
    Flonta, S., Miclea, L.C., Enyedi, S.: Electronic vote scheme based on ring signature. In: Proceedings of the IEEE International Conference on Automation, Quality, and Testing Robotics, pp. 1–3 (2009)Google Scholar
  10. 10.
    Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for largescale elections. Adv. Cryptol. AUSCRYPT’92, 244–251 (1993)Google Scholar
  11. 11.
    Gallegos-Garcia, G., Gomez-Cardenas R., Salinas, R.M., Duchen-Sanchez, G.I.: A new and secure electronic voting protocol based on bilinear pairings. In: Proceedings of the International Conference on Electronics, Communications, and Computer, pp. 240–244 (2009)Google Scholar
  12. 12.
    Gallegos-Garcia, G., Gomez-Cardenas R., Salinas, R.M., Duchen-Sanchez, G.I.: Electronic voting using identity based cryptography. In: Proceedings of the Fourth International Conference on Digital Society, pp. 31–36 (2010)Google Scholar
  13. 13.
    Hwang, M.S., Lee, C.C., Lai, Y.C.: An untraceable blind signature scheme. IEICE Transactions on Fundamentals on Electronics, Communications and Computer Science, vol. E86-A, pp. 1902–1906 (2003)Google Scholar
  14. 14.
    Juang, W.S., Lei, C.L.: A secure and practical electronic voting scheme for real world environments. IEICE Trans. Fundam. E80-A, 64–71 (1997)Google Scholar
  15. 15.
    Lin, I.C., Hwang, M.S., Chang, C.C.: Security enhancement for anonymous secure e-voting over a network. Comput. Stand. Interfaces 25, 131–139 (2003)CrossRefGoogle Scholar
  16. 16.
    Lu, E.J., Huang, C.J.: A time-stamping proxy signature scheme using time-stamping service. Int. J. Newt. Sec. 2, 43–51 (2006)Google Scholar
  17. 17.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1355–1360 (1996)Google Scholar
  18. 18.
    Mu, Y., Varadharajan, V.: Anonymous secure e-voting over a network. In: Proceedings of the 14th Annual Computer Security Application Conference, CAC-SAC’98, 2936–2939 (1998)Google Scholar
  19. 19.
    Sako, K.: Electronic voting schemes allowing open objection to the tally. IEICE Trans. Fundam. E77-A, 24–33 (1994)Google Scholar
  20. 20.
    Tan, Z.W.: Improvement on nominative proxy signature schemes. Int J. Netw. Sec. 7, 175–180 (2008)Google Scholar
  21. 21.
    Wang, S., Fan, H., Cui, G.: A proxy blind signature schemes based on DLP and applying in e-voting. In: Proceedings of the 7th International Conference on Electroni Commerce, pp. 641–645 (2005)Google Scholar
  22. 22.
    Yun, S.H., Lee, S.J.: An electronic voting scheme based on undeniable blind signature scheme. In: Proceedings of the 37th IEEE Carnahan Conference on Security, pp. 163–167 (2003)Google Scholar

Copyright information

© Springer Science+Business Media Dortdrecht 2012

Authors and Affiliations

  • Cheng-Chi Lee
    • 1
  • Te-Yu Chen
    • 2
  • Shu-Chen Lin
    • 3
  • Min-Shiang Hwang
    • 4
  1. 1.Department of Library and Information ScienceFu Jen Catholic UniversityNew Taipei CityTaiwan, ROC
  2. 2.Department of Information Networking TechnologyHsiuping University of Science and TechnologyTaichungTaiwan, ROC
  3. 3.Department of Information ManagementChaoyang University of TechnologyTaichungTaiwan, ROC
  4. 4.Department of Computer Science and Information EngineeringAsia UniversityTaichungTaiwan, ROC

Personalised recommendations