Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security of E-Voting System in Case of Malicious Users

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 5
Year of Publication: 2015
Authors:
Richa Sarma
Bubu Bhuyan
10.5120/21693-4809

Richa Sarma and Bubu Bhuyan. Article: Security of E-Voting System in Case of Malicious Users. International Journal of Computer Applications 122(5):1-4, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Richa Sarma and Bubu Bhuyan},
	title = {Article: Security of E-Voting System in Case of Malicious Users},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {5},
	pages = {1-4},
	month = {July},
	note = {Full text available}
}

Abstract

In a democratic country, voting is one of the most important activity. In many democracies over the years, there has been decrease in the number of voters coming for election because of the inconvenient voting system. An electronic voting scheme allows voters to vote securely from distance through internet by interacting with a set of authorities. However there is always a chance that an adversary can corrupt the users and jeopardize the voting system. In this paper, we have proposed an E-voting protocol that ensures the three most important requirements of E-voting system i. e privacy, verifiability and fairness even in case when some of the users are malicious.

References

  • D. Chaum, "Blind Signature for Untraceable Payments", Crypto'82, Springer-Verlag, pp:199 ?? 203; 1983.
  • A. Fujioka ,T. Okamoto,K. Ohta , "A practical secret voting scheme for large scale elections", Advanced in Cryptology - AUSCRYPT'92, 1992.
  • Michael J . Radwin "An untraceable, universally verifiable voting scheme". Seminar in Cryptology (1995)
  • Josh Daniel Cohen Benaloh and Dwight Tuinstra, "Receiptfree secret-ballot elections". In STOC'94: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pages 544 ?? 553, New York, USA, 1994. ACM.
  • Kazue Sako and Joe Kilian , "Receipt-Free Mix-Type Voting Scheme: A Practical Solution to the Implementation of a Voting Booth", EUROCRYPT'95, vol 921, Lecture Notes in Computer Science, pp. 393-403, Springer-Verlag, 1995.
  • Zuzana Rjaskova, "Electronic Voting Schemes". PhD thesis, Comenius University, Bratislava, 2002.
  • Adi Shamir, "How to share a secret Communication", ACM, 22(11) : 612 ?? 613; 1979.
  • Stefan Weber, "A coercion-resistant cryptographic voting protocol- evaluation and prototype implementation". Master's thesis, Darmstadt University of Technology, 2006
  • W. S. Juang and C. L. Lei,"A Collision- Free Secret Ballot Protocol for Computerized General Elections", Computers and Security,4,339 ?? 348(1996).
  • H. Nurmi,A. Salomaa, and L. Santean,"Secret Ballot Elections in Computer Networks", Computer and Security,6, 553 ?? 560(1991)
  • Donald E. Knuth, "Semi-numerical Algorithms", volume 2 of The Art of Computer Programming. Addison-Wesley, 1969, Second edition, 1981.