Internet Voting with Image Scanning

Receipt-Free Electronic Voting Scheme with Smart Card Using Blind Signature

V.K.Narendira Kumar, B. Srinivasan

Abstract


Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting services than conventional paper-based voting methods. A receipt-free e-voting scheme based on the virtual voting booth that can be implemented with a smart card. Receipt-freeness is achieved by distributing the voting procedure between the voter and the smart card. By using smart cards to randomize part of content of the ballot, the voter cannot construct a receipt. The voter and the smart card jointly contribute randomness for the encryption of the ballot. To provide convenience to voters, sufficient voting facilities are supplied in sufficient public voting booths.

Full Text:

PDF

References


Alessandro Acquisti. 2010. Receipt-Free Homomorphic Elections and Write-in Ballots. Technical Report. International Association for Crypto Logic Research.

Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, and Guillaume Poupard. 2001. Practical multicandidate election system. In Proceedings of the twentieth annual ACM symposium on Principles of distributed computing - PODC ’01. ACM Press, New York, New York, USA, 274–283.

M. Bellare, A. Boldyreva, and J. Staddon. 2003. Randomness re-use in multi-recipient encryption schemes. In Public Key Cryptography – PKC.

Josh D. Cohen and Michael J. Fischer. 1985. A robust and verifiable cryptographically secure election scheme. In 26th Annual Symposium on Foundations of Computer Science (sfcs 1985). IEEE, 372–382.

P. Laud. 2004. Symmetric encryption in automatic analyses for con. dentiality against active adversaries. In IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.IEEE,71–85.

Peter G. Neumann. 2007. Security Criteria for Electronic Voting. In 16th National Computer Security Conference.

Hannu Nurmi, Arto Salomaa, and Lila Santean. 1991a. Secret ballot elections in computer networks. Computers & Security 10,6(Oct. 1991), 553–560.

Hannu Nurmi, Arto Salomaa, and Lila Santean. 1991b. Secret ballot elections in computer networks. Computers & Security 10,6(Oct. 1991), 553–560.

Roy G. Saltman. 2009. Computerized Voting. In Advances in Computers. Academic Press, Chapter 5, 255–305.


Refbacks

  • There are currently no refbacks.