A Review of Cryptographic Electronic Voting
Abstract
:1. Introduction
1.1. Entities in e-Voting System
1.2. Structure of e-Voting System
1.3. Advantages and Disadvantages of Various e-Voting Approaches
1.4. Organisation of This Paper
2. Security Properties in e-Voting
2.1. Functional Requirements
- Individual verifiability: The voter can verify whether their vote is included in the final tally.
- Universal verifiability: All valid votes are included in the final tally and this is publicly verifiable.
2.2. Security Requirements
3. Cryptographic Preliminaries
3.1. Cryptographic Assumptions
- Untappable channel, proposed by Sako and Kilian [19]. It is a theoretically unobservable and secret communication channel. However, this channel is not practical for real-world implementation. Some of the proposed schemes make it even stronger with an unrealistic assumption, which is called an anonymous untappable channel.
- Private channel, proposed by Cramer et al. [20]. An observable but secure communication channel is implemented by a public or private key cryptosystem.
3.2. Cryptographic Tools
- Key generation: A generator g generates a large cyclic group G of prime order q and publish and Alice randomly selects and generates Alice keeps her private key, x and publishes her public key,
- Encryption: Bob encrypts message m with the public key of Alice. Bob first converts m into the element of G and selects a random Second, he computes and The cryptogram is a tuple
- Decryption: Alice uses her private key to decrypt by computing in
- Key generation: Let where N is RSA modulus and are the prime integers. Let g be the integer order of multiple of N modulo The private key, , where and the public key,
- Encryption: Let as the plaintext message, select randomly and generate the ciphertext,
- Decryption: Compute to decrypt where L-function takes set as the input and output .
- threshold secret sharing scheme proposed by Shamir [23], a secret is shared among k authorities where This scheme required a trusted party T to compute the shared-key generation protocol to generate the private key publish the public key and compute k shares for the private key. T sends a share to the authority via private communication channels. t or more honest authorities are required to submit their shares to be combined and construct the private key. The private key can resist collusion up to corrupt and dishonest authorities.
- Verifiable secret sharing scheme proposed by Chor et al. [24], trusted party T distributedly implementing by k authorities themselves with increase in the communication and computation. The verification of the protocol can only be done by k authorities; thus, any dispute requires a trusted third party to resolve.
- Publicly verifiable secret sharing scheme (PVSS) proposed by Schoenmakers [25], the verification of the correctness of each protocol can be conducted by any external party. This scheme provides the dispute-freeness property.
- Setup: This algorithm takes security parameter, as input and generates as the output.
- KeyGenR: This algorithm takes as the input and generates the private key and public key of the receiver.
- KeyGenS: This algorithm takes as the input and generates the private key and public key, of the sender.
- Signcrypt: This algorithm takes , the receiver’s public key, sender’s private key, and plaintext message, m from the message space, M as the input and generates homomorphic signcryption .
- Unsigncrypt: This algorithm takes , the sender’s public key, receiver’s private key, and as the input and generates plaintext message m.
- Verification: This algorithm takes , the sender’s public key, receiver’s private key, , and a message, as the input, and generate 1 if , otherwise generate 0.
- RSA digital signature: There are three algorithms in the RSA digital signature scheme, namely Key Generation, Signing, and Verification.
- –
- Key Generation: Input security parameter to compute Private key, and public key,
- –
- Signing Compute the signature, with private key and message,
- –
- Verification: Input and output 1 if
- Escrowed linkable ring signature: The origin ring signature scheme proposed by Rivest et al. [27] allows the signer to sign on the message in such a way that anyone can verify that the signature is signed by a signer from the signer group but cannot identify the real signer. This signature scheme enjoys the property of anonymity; no one can identify the identity of the real signer except for the signer himself. A linkable ring signature was first proposed by Liu et al. [28]. In addition to the ring signature scheme, this scheme enables anyone to identify whether the two signatures are signed by the same signer. Linking can be performed by linking authority in the escrowed linkable ring signature scheme. The linkability tag is encrypted with probabilistic encryption and cannot prove the non-authorship of others’ signatures. In e-voting, a linkable ring signature can prevent double-voting and the escrowed linkable ring signature can detect the dishonest voting authority.
- Blind signature: It enables one to sign the message without revealing any information about the message, thus guaranteeing anonymity. There are five algorithms in this signature scheme, namely, Key Generation, Blinding, Signing, Unblinding, and Verification.
- –
- Key Generation: Compute the private key and public key of the signer.
- –
- Blinding: Sender computes their private key and public key, uses the private key to the blind message and sends the message to the signer.
- –
- Signing: Signer uses their private key to sign the blinded message and sends the signed blinded message to the sender.
- –
- Unblinding: The sender unblinds the message and sends the signature and message to the receiver.
- –
- Verification: The receiver verifies the message and uses the public key of the signer to verify the signature.
- It is an additive subgroup: and
- It is discrete: there exists a neighbourhood of x in such that x is the only point of the lattice.
- Shortest vector problem (SVP): Given a lattice basis , find the shortest nonzero vector in
- Closest vector problem (CVP): Given a lattice basis and a target vector t, find the lattice point closest to t where the t is not compulsory in the lattice.
- Shortest independent vectors problem (SIVP): Given a lattice basis , find n linearly independent lattice vectors where for all i minimise the quantity,
4. Review of Various e-Voting Approaches
4.1. Mix-Net-Based e-Voting
4.1.1. Scheme Development
4.1.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Distinctive Features | Weaknesses |
---|---|---|---|---|
Chaum [21] | Anonymity, Privacy | RSA-based Public Key Encryption | Do not require universally trusted authority | Less efficient as it required a large length of ciphertext [32] |
Park et al. [32] | Fairness | ElGamal Encryption | Computationally secure and efficient anonymous channel without a ciphertext length expansion problem | The anonymous channel is not secure [33] |
Sako and Kilian [19] | Receipt-Freeness, Individual Verifiability | Chameleon Bit Commitment Scheme | First receipt-free mix-net-based e-voting, reduce the requirement of physical assumption to achieve receipt-freeness | Robustness and privacy problem [34] |
Michels and Horster [34] | Not provided | Chameleon Bit Commitment Scheme | Perform cryptanalysis on [19]’s proposed scheme | |
Abe [35] | Robustness, Universal Verifiability | Threshold ElGamal Decryption, ElGamal Encryption | Introduce universally verifiable mix-net | Inefficient in computation and communication, not suitable for large-scale elections [31] |
Neff [36] | Soundness, Completeness | ElGamal Encryption | The voting credentials are mixed before the election day | Size and complexity [36] and when there are large inputs, proving the correctness is inefficient [37] |
Jakobsson et al. [31] | Privacy, Robustness, Universal Verifiability | Not provided | RPC-based mix-net (Randomised Partial Checking) | Weak privacy guarantee [37] |
Boneh and Golle [37] | Soundness, Robustness, Privacy, Correctness, Universal Verifiability | ElGamal Re-Encryption Mix-Net | Ensure correct mixing for a large e-voting system, low computational mixing | Weak privacy guarantee [37] |
Chaum [38] | Vote Secrecy, Robustness | Public Key Encryption, Digital Signature, Visual Cryptography | Voter-verifiable e-voting scheme | Complexity [39] |
Ryan [39] | Not provided | Onion Encryption | Voter-verifiable e-voting scheme, easy implementation | |
Lee et al. [7] | Privacy, Double-Voting Prevention, Universal Verifiability, Fairness, Robustness, Receipt-Freeness | Threshold Decryption Protocol, ElGamal Encryption | Introduce tamper-resistant randomiser (TRR) in receipt-free mix-net-based e-voting | Less efficient due to the employment of verifiable mix-net that required higher bandwidth and computation [40] |
Aditya et al. [40] | Privacy, Eligibility, Double-Voting Prevention, Fairness, Receipt-Freeness, Robustness, Verifiability | Threshold Version of ElGamal Encryption | Enhance the efficiency of receipt-free mix-net-based e-voting | Rely on the trust assumption on administrator and vulnerable to invalidation attack by a misbehaviour mix server [40] |
Chaum et al. [41] | Vote Secrecy, Transparency, Verifiability | Onion Encryption | Improve the origin mix-net-based e-voting scheme to be a voter-verifiable e-voting system | Employ anonymous channel that is impractical in real-world [42] |
Juels et al. [43] | Correctness, Coercion-Resistance, Verifiability | Threshold version ElGamal Encryption, Plaintext Equivalence Test (PET) | Allow adversaries to coerce the voter to disclose their private key and to vote in a certain way (JCJ protocol) | Poor efficiency in removing duplicated and illegal votes [44] |
Her et al. [45] | Not provided | ElGamal Encryption | Introduce universal re-encryption mix-net and RFID system in the e-voting system | |
Carroll and Grosu [46] | Privacy, Fairness, Accuracy, Robustness, Coercion-Resistance, Universal Verifiability | Threshold Version ElGamal Encryption | Combine the user-centric mix networks and voter-verifiable receipts | |
Zwierko and Kotulski [47] | Privacy, Completeness, Soundness, Unreuseability, Eligibility, Receipt-Freeness, Robustness, Verifiability | Merkle’s Puzzles, Secure Secret Sharing Scheme | Multi-interface with mobile voting architecture | |
Clarkson et al. [48] | Coercion-Resistance, Universal Verifiability | RSA ElGamal Encryption | Suitable for remote e-voting (Civitas) | Robustness and the coercion-resistance problem [17] |
Sebé et al. [4] | Authentication, Unicity, Privacy, Integrity, Coercion-Resistance, Fairness | ElGamal Encryption, Elliptic Curves | Hash-based with ElGamal homomorphic properties | |
Furukawa et al. [49] | Universal Verifiability | ElGamal Encryption, Elliptic Curve | Suitable to be used in a private organisation with over 20,000 voters | Do not achieve receipt-freeness and do not guarantee the privacy of abstaining voters |
Lee et al. [50] | Privacy, Unreusability, Eligibility, Fairness, Completeness, Soundness | ElGamal Encryption | Provide voters with a receipt with the divide-and-choose method | Difficult to compare verification codes on the screen and printed receipt, voters need to choose numerous random selections [50] |
Bulens et al. [51] | IND-CCA2 Security assuming the DDH problem is hard | Submission Secure Augmented (SSA) Cryptosystem | Introduce mix-net in Helios 3.1 | |
Peng [2] | Privacy, Soundness | Threshold Version ElGamal Encryption | More efficient and robust with ElGamal encryption | |
Spycher et al. [44] | Privacy, Accuracy, Coercion-Resistance | Plaintext Equivalence Test (PET), ElGamal Encryption | Coercion-resistant e-voting scheme in linear time | The scheme does not fulfil coercion-resistance [52] |
Bibiloni et al. [10] | Privacy | Signed ElGamal Encryption | The validity of votes is checked during the election period instead of the tallying process | |
Tamura et al. [53] | Privacy, Fairness, Robustness, Verifiability | Not provided | Employ modified simplified verifiable re-encryption mix-nets (SVRM) | Less efficient as the scheme assumed there is a state erasable voting booth [54] |
Chang et al. [55] | Privacy, Fairness, Robustness, Completeness, Unreusability, Eligibility, Receipt-Freeness, Verifiability | ElGamal Encryption | End-to-end verifiability mix-net based on Helios 1.0 | |
AboSamra et al. [11] | Integrity, Accuracy, Scalability, Practicality, Privacy, Eligibility, Fairness, Coercion-Resistance, Receipt-Freeness, Transparency, Verifiability | Threshold Secret Sharing Scheme, Digital Signature, Public Key Encryption | Use voting machine and paper ballots | |
Alam et al. [54] | Privacy, Accuracy, Integrity, Coercion-Resistance, Fairness, Robustness | ElGamal Encryption | Employ modified SVRM and confirmation numbers (CN) | |
McMurtry et al. [56] | Privacy, Verifiability, Weak Receipt-Freeness | ElGamal Encryption, Pedersen Commitment | Voting integrity is ensured even though all electronic devices are corrupted | The protocol ensures the weak receipt-freeness property [56] |
Rønne et al. [57] | Universal Verifiability, Individual Verifiability, Privacy, Receipt-Freeness, Coercion-Resistance | Homomorphic Encryption, Plaintext Equivalence Test (PET) | End-to-end verifiable e-voting scheme (Selene) | |
Tejedor-Romero et al. [58] | Verifiability, Privacy, Integrity, Eligibility | Shamir Secret Sharing | Remote end-to-end verifiable e-voting scheme (DiverSEC) | Voters are able to prove their votes to coercers; no real-time troubleshooting protocols that can withstand integrity attacks [58] |
4.2. Homomorphic e-Voting
4.2.1. Scheme Development
4.2.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Distinctive Features | Weaknesses |
---|---|---|---|---|
Cohen and Fischer [68] | Privacy, Correctness | Public Key Encryption | Hide the actual votes value instead of hiding the voters | Do not satisfy vote secrecy [22] |
Benaloh and Yung [70] | Privacy, Correctness | Probabilistic Encryption | Enhance privacy of voters | Efficiency problem [32] |
Benaloh [71] | Robustness, Verifiability | Probabilistic Encryption, Threshold Decryption | Multi-authority election | Rely on r-th residuosity assumptions, once the assumption is broken, the ballots can be decrypted [22] |
Sako and Kilian [72] | Universal Verifiability | Families of Partially Compatible Homomorphic Encryption Functions | A partially compatible homomorphic encryption function | Less efficient as the scheme relied on discrete logarithm assumption, robustness is not fully addressed [20] |
Benaloh and Tuinstra [73] | Privacy, Correctness, Receipt-Freeness, Verifiability | Probabilistic Encryption | Implement voting booth and the scheme can be either one tallying authority or multiple tallying authorities | Rely on r-th residuosity assumptions, once the assumption is broken, the ballots can be decrypted [22] |
Cramer et al. [20] | Privacy, Robustness, Universal Verifiability | Homomorphic Encryption | A non-interactive verifiable secret sharing based on discrete logarithms | Computational and communication complexity [22] |
Cramer et al. [22] | Privacy, Robustness, Double-Voting Prevention, Universal Verifiability | Threshold version ElGamal Encryption | Multi-authority election | Only support Yes/No elections [74] and not suitable for large-scale elections [52] |
Hirt and Sako [75] | Privacy, Receipt-Freeness, Correctness | ElGamal Encryption | Vote-and-go e-voting scheme | Employ a one-way untappable channel that is a weak physical assumption for receipt-freeness [76] |
Lee and Kim [77] | Privacy, Completeness, Soundness, Unreusability, Eligibility, Fairness, Robustness, Receipt-Freeness, Universal Verifiability | Threshold version ElGamal Encryption | Implement honest verifier in the receipt-free scheme | The malicious honest verifier can falsify the result of the vote; the voter can cast an invalid vote with the assistance of the malicious honest verifier [78] |
Hirt [78] | Receipt-Freeness | Homomorphic Encryption Scheme | Implement shuffling technique with a randomiser | Employ a two-way untappable channel that is difficult to implement in the real-world [76] |
Magkos et al. [79] | Privacy, Robustness, Double-Voting Prevention, Universal Verifiability, Receipt-Freeness | Threshold version ElGamal Encryption | Employ a tamper-resistance smartcard and fulfil receipt-freeness without the implementation of untappable channels between voting authorities and the voter | Do not satisfy receipt-freeness [76] |
Damgård and Jurik [80] | Not provided | Paillier Probabilistic Public-Key Encryption | Multi-authority election | Privacy is guaranteed if the verifier is honest [81] |
Baudron et al. [74] | Privacy, Receipt-Freeness, Robustness, Verifiability | Paillier Encryption, Threshold Decryption | Support countrywide elections | If all tallying authorities collectively corrupt, the ballot secrecy will not be protected [15] |
Katz et al. [82] | Privacy, Robustness, Universal Verifiability | Encryption Scheme Employing Quadratic Residuosity | Introduce a cryptographic counter | Do not support receipt-freeness and prevention of double-voting; less practical due to the number of rounds needed for voting to be carried out [82] |
Kiayias and Yung [1] | Privacy, Dispute-Freeness, Fairness, Perfect Vote Secrecy, Universal Verifiability | Homomorphic Encryption | In the tallying phase, any third party can be the tallier, often referred to as self-tallying election | Privacy is guaranteed if the verifiers are honest [81] |
Lee and Kim [76] | Privacy, Completeness, Soundness, Unreusability, Eligibility, Fairness, Robustness, Receipt-Freeness, Coercion-Resistance, Universal Verifiability | ElGamal Encryption, Threshold ElGamal Decryption | Introduce a tamper-resistance randomiser in receipt-free scheme | Less efficient in vote validity checking [83] |
Peng et al. [69] | Unlinkability, Verifiability | ElGamal Encryption | Multiplicative homomorphism | Weak privacy [66] |
Adida [61] | Privacy, Coercion-Resistance, Verifiability | ElGamal Encryption | First web-based and open audit homomorphic e-voting (Helios 1.0) | High computational cost and complex proof of integrity of mix-net [55] |
Chow et al. [15] | Receipt-Freeness, Correctness, Vote Secrecy, Universal Verifiability | ElGamal Encryption, Escrowed Linkable Ring Signatures | Vote-and-go election scheme without tamper-resistant hardware and anonymous channel | |
Peng and Bao [84] | Privacy, Robustness, Correctness | Distributed Paillier Encryption | Improve the efficiency of the proof of vote validity in homomorphic e-voting | Privacy is guaranteed if the verifier is honest [81] |
Peng and Bao [83] | Not provided | Paillier Encryption and Distributed Decryption, Digital Signature | A special membership proof is introduced to improve the efficiency in the proof of the validity of votes | The scheme is efficient if only one verifier checks the vote validity, thus it is not universally verifiable [81] |
Huszti [85] | Privacy, Receipt-Freeness, Eligibility, Coercion-Resistance, Unreusability, Verifiability | Distributed ElGamal Encryption, RSA Blind Signature, Meta-ElGamal Signature | Combine the signature scheme with the homomorphic e-voting system | |
Peng [81] | Privacy | Distributed Paillier Encryption | Improve the efficiency of the proof of vote validity | |
Bernhard et al. [86] | Vote Secrecy | ElGamal Encryption | Multi-authority election | |
Yi and Okamoto [87] | Coercion-Resistance, Verifiability | Threshold version ElGamal Encryption, Modified ElGamal Signature | Large-scale remote end-to-end homomorphic e-voting | Employ an untappable channel in the proposed scheme |
Shinde et al. [88] | Privacy, Completeness, Double-Voting Prevention, Eligibility, Fairness, Correctness, Receipt-Freeness, Universal Verifiability | Modified ElGamal Encryption, ElGamal Digital Signature | Combine the signature scheme with the homomorphic e-voting system | |
Àngels Cerveró et al. [89] | Privacy, Fairness, Authentication, Integrity, Unicity, Coercion-Resistance, Verifiability | Elliptic Curve ElGamal Encryption, Digital Signature | Remote and large-scale elections | |
Kiayias et al. [90] | Privacy, Verifiability | ElGamal Encryption | An end-to-end verifiable e-voting without any setup assumptions or any existence of random oracle | |
Yang et al. [91] | Privacy, Integrity, Correctness, Verifiability | Exponential ElGamal Encryption | Multi-authority election and end-to-end voter-verifiable scheme | Security assumption relies on the existence of at least one authority that is honest [91] and high computational cost [92] |
Fan et al. [93] | Privacy, Correctness, Eligibility, Unicity, Transparency | Homomorphic Signcryption, Distributed Homomorphic Encryption | Election result can be tallied by anyone | |
Fan et al. [92] | Privacy, Eligibility, Transparency, Unicity, Correctness, Verifiability | Homomorphic Signcryption | Lighten the tallying process by employing homomorphic signcryption scheme | Support only Yes/No elections [92] |
4.3. Blind Signature-Based e-Voting
4.3.1. Scheme Development
4.3.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Distinctive Features | Weaknesses |
---|---|---|---|---|
Fujioka et al. [97] | Completeness, Soundness, Privacy, Unreusability, Eligibility, Fairness, Verifiability | Bit-Commitment, Digital Signature, Blind Signature | Support large-scale elections at the same time ensure fairness and privacy | Voters are required to join the election from registering phase to the counting phase [103] |
Okamoto [104] | Privacy, Fairness, Anonymity, Receipt-Freeness | RSA Blind Signature, Public-Key Encryption, Trap-Door Bit-Commitments | Implemented using a one-way anonymous communication channel between voter and authority | Coercers can force voters to use special parameters, thus the ballot can open in one way and the scheme is not receipt-freeness [8] |
Okamoto [105] | Receipt-Freeness | RSA Blind Signature, Public-Key Encryption | Introduce a voting commission and untappable channel, suitable for large-scale elections | The voter is required to be active in all election phases, relying on a anonymous one-way secret communication assumption where this is difficult to implement in practice [75] |
Ohkubo et al. [103] | Privacy, Completeness, Eligibility, Fairness, Unreusability, Verifiability | Threshold Encryption, Blind Signature, Digital Signature | Introduce the vote-and-go concept | The scheme does not satisfy receipt-freeness [106] |
Jan et al. [107] | Privacy, Accuracy | Blind Signature | A practical e-voting scheme with the integration of e-mail and a web browser | |
Magkos and Chrissikopoulos [108] | Privacy, Accuracy, Verifiability | RSA Public Key Encryption, Blind Signature | Equitably fair blind signature-based e-voting scheme | |
Ibrahim et al. [109] | Universal Verifiability | Digital Signature, Blind Signature, Diffie–Hellman Key Exchange, Password-Based Encryption | Implement Java socket technology and a BouncyCastle cryptography provider | |
Liaw [16] | Completeness, Coercion-Resistance, Unicity Robustness, Fairness, Anonymity, and Verifiability | RSA Blind Signature | Enhance the blind signature-based e-voting to satisfy maximum properties | |
Xia and Schneider [8] | Receipt-Freeness, Individual Verifiability | RSA Blind Signature, mix-net | First voter-verifiable receipt-free e-voting scheme | |
Cetinkaya and Doganaksoy [42] | Privacy, Eligibility, Coercion-Resistance, Unicity, Fairness, Robustness, Accuracy, Individual Verifiability, Universal Verifiability | RSA Blind Signature, Threshold encryption | Combine blind signature-based e-voting with s Pseudo Voter Identity (PVID) scheme (DynaVote) | Privacy issues and less efficient in the recast process in counting phase [110] |
Cetinkaya and Koc [110] | Privacy, Coercion-Resistance, Accuracy, Unicity, Robustness, Fairness, Eligibility, Individual Verifiability | RSA Blind Signature | Employ a PVID scheme | |
Koenig et al. [111] | Privacy, Anonymity | Threshold Blind Signature | Multi-authority election scheme | May be prone to denial of service attacks and anonymity problems [112] |
Zhang et al. [113] | Correctness | Identity-Based Blind Signature | Combine identity-based cryptography with a blind signature | High computational cost to manage certificates [114] |
Kucharczyk [115] | Vote Secrecy, Anonymity | RSA Blind Signature | Enhance the anonymity of voter and system authorisation | Easy to create proof of vote and vote selling [115] |
Mohanty and Majhi [116] | Privacy, Anonymity, Unlinkability, Unicity, Coercion-Resistance, Verifiability | Blind signature | Multi-authority election scheme | |
Buccafurri et al. [117] | Robustness, Unicity, Scalability, Secrecy, Verifiability | Digital Signature, Blind and Partially Blind Signature | Lightweight e-voting scheme that relies on the existing social networks | |
Song and Cui [118] | Completeness, Accuracy, Unreusability, Robustness, Verifiability | ElGamal Blind Signature | Combine ElGamal blind signature and XML | |
Nguyen and Dang [52] | Privacy, Unicity, Eligibility, Receipt-Freeness, Coercion-Resistance, Fairness, Accuracy, Individual Verifiability, Universal Verifiability | RSA Blind Signature, ElGamal Encryption, PET | Allow more powerful adversaries to collude in the proposed scheme | |
López-García et al. [119] | Privacy, Eligibility, Unicity, Coercion-Resistance, Receipt-Freeness, Accuracy, Verifiability | Elliptic Curves, Bilinear Pairings, Short Signature, Blind Signature | Introduce pairing-based blind signature | Security assumption relies on the existence of an honest third party [91] |
Chen et al. [120] | Vote Secrecy, Fairness, Anonymity, Coercion-Resistance, Verifiability | Secret Sharing Scheme, ElGamal Blind Signature | Combine a secret sharing scheme and ElGamal blind signature | |
Zhang et al. [9] | Privacy, Anonymity, Unicity, Accuracy, Fairness, Verifiability | Blind Signature | Integrate blind signature-based e-voting with a Kerberos authentication mechanism | Collusion of multiple servers and vulnerable to denial of service attacks are suffered by this scheme [9] and high computational cost to manage certificates [114] |
Garciía [121] | Privacy, Eligibility, Dispute-Freeness, Fairness, Coercion-Resistance, Scalability, Robustness, Verifiability | RSA Blind Signature | Coercion-resistant e-voting that can also be used as debate tools | |
Darwish and Gendy [106] | Privacy, Robustness, Receipt-Freeness, Correctness, Fairness, Coercion-Resistance, Verifiability | Public Key Infrastructure (PKI), RSA Public Key Encryption, RSA Blind Signature | Combine blind signature-based e-voting with a bit commitment scheme | |
Kumar et al. [114] | Completeness, Secure Against Replay Attack | Elliptic Curve, Bilinear Pairing, Blind Signature, Identity-Based Signature, Short Signature | Combine a blind signature scheme with identity-based cryptosystem and short signature scheme | Not suitable for large-scale elections due to the key escrow problem in the identity-based blind signature scheme [99] |
Kumar et al. [122] | Completeness | Elliptic Curve, Bilinear Pairing, Blind Signature, Identity-Based Signature, Short Signature | Combine [123] the blind signature scheme, [124] identity-based signature, and [125] short signature | |
Aziz [126] | Privacy, Vote Secrecy, Receipt-Freeness, Coercion-Resistance, Accountability, Individual Verifiability, Universal Verifiability | RSA Blind Signature, Mix-Net | The voter is not required to sign on anything and not required to generate any key | The scheme is assumed to be secure if the registrar is not corrupted and the scheme does not satisfy individual verifiability [126] |
Kumar et al. [99] | Anonymity, Integrity, Coercion-Resistance, Unicity, Individual Verifiability, Universal Verifiability | Identity-Based Blind Signature, Short Signature | Employ identity-based blind signature and a short signature scheme | |
Waheed et al. [127] | Integrity, Authentication, Unlinkability | Blind Signcryption, Elliptic Curve Cryptosystem (ECC) | Small key size, low computational and communication costs |
4.4. Blockchain-Based e-Voting
4.4.1. Scheme Development
4.4.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Type of Blockchain | Platform | Distinctive Features | Weaknesses |
---|---|---|---|---|---|---|
McCorry et al. [134] | Privacy, Dispute-Freeness | Smart Contract | Ethereum test network | Ethereum Blockchain | Decentralised, self-tallying, do not rely on any trusted authority | |
Liu and Wang [129] | Universal Verifiability, Individual Verifiability, Anonymity, Transparency | Blind Signature | Can deploy in both public and permissioned blockchains | Not provided | The proposed scheme can be integrated with either a public blockchain or permissioned blockchain | The scheme is assumed to be secure if the inspector and organiser are honest and privacy of voters may disclose via IP address [129] |
Cruz and Kaji [112] | Completeness, Robustness, Anonymity, Soundness, Privacy, Unreusability, Fairness, Eligibility, Individual Verifiability, Universal Verifiability | Blind Signature | Public blockchain | Bitcoin Blockchain | Prepaid bitcoin card for voter registration | The scheme is impractical if there is large a number of voters due to the distribution of Prepaid Bitcoin cards (PBCs) [112] |
Gong et al. [135] | Eligibility, Anonymity, Verifiability, Fairness | Threshold Blind Signature, Threshold ElGamal Decryption | Public blockchain | Not provided | Employ distributed authority | |
Gao et al. [136] | Anonymity, Unicity, Fairness, Verifiability, secure against quantum attack | Public Key Encryption Based on Coding Theory, Ring Signature | Permissioned blockchain | Not provided | The scheme can resist quantum attacks | Less efficient if there is a large number of voters [136] |
Chaieb and Yousfi [137] | Eligibility, Completeness, Soundness, Robustness, Fairness, Integrity, Privacy, Universal Verifiability, Receipt-Freeness, Coercion-Resistance | ElGamal Encryption, Short Group Signature Scheme, Mix-Net | Public blockchain | Not provided | End-to-end verifiable large-scale elections with linear complexity in the vote tallying process (LOKI Vote) | |
Zhou et al. [138] | Eligibility, Privacy, Fairness, Unicity, Receipt-Freeness, Individual Verifiability, Universal Verifiability, Coercion-Resistance | Blind Signature, Bit Commitment, Smart Contract | Permissioned blockchain | Hyperledger Fabric | Implement smart contract instead of trusted third party | |
Priya and Rupa [139] | Privacy | Smart Contract | Public blockchain | Ethereum Blockchain | Implement a smart contract instead of a trusted third party | |
Zaghloul et al. [140] | Double-Voting Prevention, Anonymity, Unlinkability, Coercion-Resistance | Digital Signature, Smart Contract | Public blockchain | Not provided | This scheme can be implemented in IoT devices and can support large-scale elections | |
Kim et al. [141] | Verifiability, Integrity, Transparency | Ring Signature, Homomorphic Encryption | Permissioned blockchain | Hyperledger Fabric | Support large-scale elections | |
Lu et al. [142] | Verifiability, Robustness, Anonymity, Fairness, Receipt-Freeness | Mix-Net, Public Key Encryption, Joint Shamir Random Secret Sharing | Public blockchain | Bitcoin Blockchain | Integrate mix-net in blockchain e-voting to ensure strong anonymity (BEvote) | |
Ye et al. [143] | Coercion-Resistance, Correctness, Privacy, Verifiability, Fairness, Eligibility | Smart Contract, Modified ElGamal Encryption | Not provided | Not provided | Coercion-resistant e-voting secure under DDH assumption | Better efficiency in small-scale elections [143] |
Rathore and Ranga [144] | Authentication, Anonymity, Unicity | Smart Contract, Elliptic Curve Cryptography | Permissioned blockchain | Ethereum Blockchain | Remote e-voting scheme that can be integrated with any existing system | |
Hassan et al. [145] | Anonymity | Smart Contract | Permissioned blockchain | Hyperledger Fabric | Lowers the cost of conducting nationwide elections | |
ElSheikh and Youssef [146] | Completeness, Soundness, Dispute-Freeness | Smart Contract | Not provided | Ethereum Blockchain | Higher scalability by preforming all the heavy computations off-chain |
4.5. Post-Quantum e-Voting
4.5.1. Scheme Development
4.5.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Distinctive Features | Weaknesses |
---|---|---|---|---|
Chillotti et al. [151] | Privacy, Verifiability, Correctness | Existentially Unforgeable Signatures, Non-Malleable Encryption, LWE-based Homomorphic Encryption, Trapdoors for Lattices | Employ fully homomorphic encryption scheme in Helios | The security of the scheme relied on the honest bulletin board [151] |
Aziz et al. [152] | Privacy, Eligibility, Accuracy, Fairness, Receipt-Freeness, Coercion-Resistance, Dispute-Freeness, Robustness, Scalability, Verifiability | Fully Homomorphic Encryption | Fully homomorphic encryption based on cloud services | The public key size and vote size can be decreased [152] |
Pinilla [29] | Not provided | Lattice-based | First shuffling proof for lattice-based mix-net based on the intractability of the following lattice-problem: Inhomogeneous Short Integer Solution (ISIS) and Ring Learning With Errors (RLWE) | |
Dong and Yang [12] | Completeness, Privacy, Robustness, Unreusability, Verifiability, Eligibility, Fairness | Encrypted No-Key (ENK) Protocol, Message Authentication Code (MAC) | e-Voting scheme based on post-quantum security and physical laws | |
Ronne et al. [153] | Not provided | Fully Homomorphic Encryption | Enhances Juels et al.’s (2005) e-voting scheme to be quantum safe | No formal security proof to prove if the scheme is secure against classical adversary [153] |
Boyen et al. [154] | Privacy, Accountability, Verifiability | IND-CCA2-Secure Threshold Public Key Encryption | First practical, verifiable lattice-based decryption mix-net based e-voting | |
Liao [155] | Anonymity, Unicity, Completeness, Universal Verifiability | Elliptic Curve Digital Signature, Identity Based Fully Homomorphic Encryption | Multi-candidate e-voting | High time complexity of asymmetric encryption [155] |
Feng et al. [156] | Anonymity, Completeness, Universal Verifiability | Traceable Ring Signature, Lattice-based | Employ efficient traceable ring signature from lattices that secure in quantum random oracle model | |
Farzaliyev et al. [157] | Completeness, Soundness, Privacy | Mix-Net, Ring-LWE Encryption | Design quantum-resistant mix-net for large-scale e-voting that can support 100,000 votes | |
Kaim et al. [158] | Correctness, Verifiability, Anonymity | Lattice-based, Threshold Version of Blind Signature | Support multi-candidates and complex ballots structure |
4.6. Hybrid e-Voting
4.6.1. Scheme Development
4.6.2. Comparison Analysis
Scheme | Security Properties | Cryptographic Tools | Hybrid Combination | Distinctive Features | Weaknesses |
---|---|---|---|---|---|
Kiayias and Yung [159] | Robustness, Fairness, Universal Verifiability | Threshold Homomorphic Encryption and Capacity Assumption | Mix-net + homomorphic | Accept write-in ballots | Required more work and time as the voters have to prove the consistency of vector ballots [159] |
Aditya [160] | Privacy, Anonymity, Unlinkability | Threshold ElGamal Encryption | Multiplicative homomorphism + mix-net | Flexible ballot structure | |
Peng [161] | Privacy, Soundness | ElGamal Encryption | Shuffling technique + multiplicative homomorphic tallying | Support complex election, efficient key generation distribution | Receipt-freeness does not focus in this paper [161] |
Peng and Bao [66] | Privacy | ElGamal Encryption with Distributed Decryption, Fujisaki–Okamoto commitment algorithm | Shuffling technique + multiplicative homomorphic scheme | Simple vote format, efficient vote validity check | Receipt-freeness and coercion-resistance were not the focus of this paper [66] |
Hussien and Aboelnaga [162] | Eligibility, Secrecy, Unicity, Privacy, Accuracy | Paillier Encryption, RSA Blind Signature | Homomorphic + blind signature | The proposed scheme is deployed in the voting machine in the poll station | |
Mateu et al. [163] | Privacy, Fairness, Unicity, Authentication, Verifiability | Elliptic ElGamal Encryption | Mix-net + homomorphic e-voting | Combine zero knowledge proof for mixing and homomorphic tallying |
5. Practical Considerations in e-Voting
- Denial-of-service (DoS) attacks. The main goal of DoS attacks is to slow down computer systems and to the extent that it affects the casting of votes, tallying of votes, and the auditing process.
- Malware attacks. Malicious software that can disrupt the casting of votes and the auditing process, and alter or destroy stored ballots.
- Malicious individuals or servers break into the system to retrieve administrator-level sensitive data such as voters’ credentials.
- If the system is designed properly.
- If the system is configured and updated accordingly.
- If the system is operated and managed accordingly.
- Resources and skills of potential attackers.
6. Potential Research Directions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kiayias, A.; Yung, M. Self-Tallying Elections And Perfect Ballot Secrecy. In Public Key Cryptography; Lecture Notes in Computer Science; Naccache, D., Paillier, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2274, pp. 141–158. [Google Scholar] [CrossRef] [Green Version]
- Peng, K. An Efficient Shuffling Based eVoting Scheme. J. Syst. Softw. 2011, 84, 906–922. [Google Scholar] [CrossRef]
- Oo, H.N.; Aung, A. A Survey Of Different Electronic Voting Systems. Int. J. Sci. Eng. Res. 2014, 3, 3460–3464. [Google Scholar]
- Sebé, F.; Miret, J.M.; Pujolàs, J.; Puiggalí, J. Simple And Efficient Hash-Based Verifiable Mixing For Remote Electronic Voting. Comput. Commun. 2010, 33, 667–675. [Google Scholar] [CrossRef]
- Li, H.; Kankanala, A.R.; Zou, X. A Taxonomy And Comparison Of Remote Voting Schemes. In Proceedings of the 2014 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China, 4–7 August 2014; pp. 1–8. [Google Scholar] [CrossRef]
- OASIS (Organization for the Advancement of Structured Information Standards); Office of the e-Envoy. Election Markup Language (EML) Process and Data Requirements 4.0a. 2013. Available online: https://www.oasis-open.org/standards (accessed on 12 December 2020).
- Lee, B.; Boyd, C.; Dawson, E.; Kim, K.; Yang, J.; Yoo, S. Providing Receipt-Freeness In Mixnet-Based Voting Protocols. In Information Security and Cryptology. ICISC 2003; Lecture Notes in Computer Science; Lim, J.I., Lee, D.H., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 2971, pp. 245–258. [Google Scholar] [CrossRef] [Green Version]
- Xia, Z.; Schneider, S. A New Receipt-Free E-Voting Scheme Based On Blind Signature (Abstract). WOTE 2006, 6, 127–135. [Google Scholar]
- Zhang, H.; You, Q.; Zhang, J. A Lightweight Electronic Voting Scheme Based On Blind Signature And Kerberos Mechanism. In Proceedings of the 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication, Beijing, China, 14–16 May 2015; pp. 210–214. [Google Scholar] [CrossRef]
- Bibiloni, P.; Escala, A.; Morillo, P. Vote Validatability in Mix-Net-Based eVoting. In E-Voting and Identity. Vote-ID 2015; Lecture Notes in Computer, Science; Haenni, R., Koenig, R.E., Wikström, D., Eds.; Springer International Publishing: Cham, Switzerland, 2015; Volume 9269, pp. 92–109. [Google Scholar] [CrossRef] [Green Version]
- AboSamra, K.M.; AbdelHafez, A.A.; Assassa, G.M.; Mursi, M.F. A Practical, Secure, and Auditable e-Voting System. J. Inf. Secur. Appl. 2017, 36, 69–89. [Google Scholar] [CrossRef]
- Dong, H.; Yang, L. A Voting Scheme with Post-Quantum Security Based on Physical Laws. arXiv 2018, arXiv:1805.12480. [Google Scholar] [CrossRef]
- Hardwick, F.S.; Gioulis, A.; Akram, R.N.; Markantonakis, K. E-Voting With Blockchain: An E-Voting Protocol with Decentralisation And Voter Privacy. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Communications in Computer and Information Science. Halifax, NS, Canada, 30 July–3 August 2018; pp. 1561–1567. [Google Scholar] [CrossRef] [Green Version]
- Çabuk, U.; Adiguzel, E.; Karaarslan, E. A Survey On Feasibility And Suitability of Blockchain Techniques for the E-Voting Systems. Int. J. Adv. Res. Comput. Commun. Eng. (IJARCCE) 2018, 7, 124–134. [Google Scholar] [CrossRef]
- Chow, S.; Liu, J.; Wong, D. Robust Receipt-Free Election System With Ballot Secrecy And Verifiability. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, CA, USA, 10–13 February 2008; The Internet Society: San Diego, CA, USA, 2008; Volume 8, pp. 81–94. [Google Scholar]
- Liaw, H.T. A Secure Electronic Voting Protocol For General Elections. Comput. Secur. 2004, 23, 107–119. [Google Scholar] [CrossRef]
- Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M. Robust Electronic Voting: Introducing Robustness In Civitas. In Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, Trento, Italy, 29 August 2011; pp. 47–55. [Google Scholar] [CrossRef]
- Ikonomopoulos, S.; Lambrinoudakis, C.; Gritzalis, D.; Kokolakis, S.; Vassiliou, K. Functional requirements for a secure electronic voting system. In Security in the Information Society; Springer: Berlin/Heidelberg, Germany, 2002; pp. 507–519. [Google Scholar]
- Sako, K.; Kilian, J. Receipt-Free Mix-Type Voting Scheme. In Advances in Cryptology—EUROCRYPT ’95; Lecture Notes in Computer Science; Guillou, L.C., Quisquater, J.J., Eds.; Springer: Berlin/Heidelberg, Germany, 1995; Volume 921, pp. 393–403. [Google Scholar] [CrossRef]
- Cramer, R.; Franklin, M.; Schoenmakers, B.; Yung, M. Multi-Authority Secret-Ballot Elections With Linear Work. In Advances in Cryptology. EUROCRYPT ’96; Lecture Notes in Computer Science; Maurer, U., Ed.; Springer: Berlin/Heidelberg, Germany, 1996; Volume 1070, pp. 72–83. [Google Scholar] [CrossRef] [Green Version]
- Chaum, D.L. Untraceable Electronic Mail, Return Addresses, And Digital Pseudonyms. Commun. ACM 1981, 24, 84–90. [Google Scholar] [CrossRef]
- Cramer, R.; Gennaro, R.; Schoenmakers, B. A Secure And Optimally Efficient Multi-Authority Election Scheme. In Advances in Cryptology. EUROCRYPT ’97; Lecture Notes in Computer Science; Fumy, W., Ed.; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1233, pp. 103–118. [Google Scholar] [CrossRef] [Green Version]
- Shamir, A. How To Share A Secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Chor, B.; Goldwasser, S.; Micali, S.; Awerbuch, B. Verifiable Secret Sharing And Achieving Simultaneous Broadcast. In Proceedings of the 26th Symposium on Foundations of Computer Science, Portland, OR, USA, 21–23 October 1985; pp. 335–344. [Google Scholar]
- Schoenmakers, B. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In Advances in Cryptology—CRYPTO’ 99; Wiener, M., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1666, pp. 148–164. [Google Scholar] [CrossRef] [Green Version]
- Zhang, P.; Yu, J.; Liu, H. A Homomorphic Signcryption Scheme and Its Application In Electronic Voting. J. Shenzhen Univ. Sci. Eng. 2011, 28, 489–494. [Google Scholar]
- Rivest, R.L.; Shamir, A.; Tauman, Y. How To Leak A Secret. In Advances in Cryptology—ASIACRYPT 2001; Boyd, C., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 552–565. [Google Scholar] [CrossRef] [Green Version]
- Liu, J.K.; Wei, V.K.; Wong, D.S. Linkable Spontaneous Anonymous Group Signature For Ad Hoc Groups. In Information Security and Privacy; Wang, H., Pieprzyk, J., Varadharajan, V., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3108, pp. 325–335. [Google Scholar] [CrossRef] [Green Version]
- Pinilla, R.M. Fully Post-Quantum Protocols for e-Voting, Coercion Resistant Cast as Intended and Mixing Networks. Ph.D. Thesis, Universitat Politècnica de Catalunya, Barcelona, Spain, 2018. [Google Scholar]
- Bernstein, D.J. Introduction to post-quantum cryptography. In Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2009; pp. 1–14. [Google Scholar]
- Jakobsson, M.; Juels, A.; Rivest, R.L. Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. In Proceedings of the 11th USENIX Security Symposium, Washington, DC, USA, 2 March 2002; USENIX Association: Washington, DC, USA, 2002; pp. 339–353. [Google Scholar] [CrossRef]
- Park, C.; Itoh, K.; Kurosawa, K. Efficient Anonymous Channel And All/Nothing Election Scheme. In Advances in Cryptology. EUROCRYPT ’93; Lecture Notes in Computer Science; Helleseth, T., Ed.; Springer: Berlin/Heidelberg, Germany, 1994; Volume 765, pp. 248–259. [Google Scholar] [CrossRef] [Green Version]
- Pfitzmann, B. Breaking An Efficient Anonymous Channel. In Advances in Cryptology—EUROCRYPT’94; Lecture Notes in Computer Science; Santis, A.D., Ed.; Springer: Berlin/Heidelberg, Germany, 1995; Volume 950, pp. 332–340. [Google Scholar] [CrossRef] [Green Version]
- Michels, M.; Horster, P. Some Remarks On A Receipt-Rree And Universally Verifiable Mix-Type Voting Scheme. In Advances in Cryptology. ASIACRYPT ’96; Lecture Notes in Computer Science; Kim, K., Matsumoto, T., Eds.; Springer: Berlin/Heidelberg, Germany, 1996; Volume 1163, pp. 125–132. [Google Scholar] [CrossRef]
- Abe, M. Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers. In Advances in Cryptology—EUROCRYPT’98; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1998; Volume 1403, pp. 437–447. [Google Scholar] [CrossRef] [Green Version]
- Neff, C.A. A Verifiable Secret Shuffle and Its Application to E-Voting. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS ’01), Philadelphia, PA, USA, 6–8 November 2001; Association for Computing Machinery: New York, NY, USA, 2001; pp. 116–125. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Golle, P. Almost Entirely Correct Mixing with Applications to Voting. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, Washington, DC, USA, 18–22 November 2002; Kim, K., Ed.; Association for Computing Machinery: New York, NY, USA, 2002; pp. 68–77. [Google Scholar] [CrossRef] [Green Version]
- Chaum, D. Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Secur. Priv. 2004, 2, 38–47. [Google Scholar] [CrossRef]
- Ryan, P.Y.A. A Variant of the Chaum Voter-Verifiable Scheme; Technical Report CS-TR: 864; University of Newcastle upon Tyne: Newcastle upon Tyne, UK, 2004. [Google Scholar]
- Aditya, R.; Lee, B.; Boyd, C.; Dawson, E. An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. In Trust and Privacy in Digital Business. TrustBus 2004; Lecture Notes in Computer Science; Katsikas, S., Lopez, J., Pernul, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3184, pp. 152–161. [Google Scholar] [CrossRef]
- Chaum, D.; Ryan, P.Y.A.; Schneider, S. A Practical Voter-Verifiable Election Scheme. In Computer Security. ESORICS 2005; Lecture Notes in Computer Science; de Capitani di Vimercati, S., Syverson, P., Gollmann, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3679, pp. 118–139. [Google Scholar] [CrossRef] [Green Version]
- Cetinkaya, O.; Doganaksoy, A. A Practical Verifiable e-Voting Protocol for Large Scale Elections over A Network. In Proceedings of the Second International Conference on Availability, Reliability and Security (ARES’07), Vienna, Austria, 10–13 April 2007; pp. 432–442. [Google Scholar] [CrossRef] [Green Version]
- Juels, A.; Catalano, D.; Jakobsson, M. Coercion-Resistant Electronic Elections. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES ’05, Alexandria, VA, USA, 7 November 2005; Association for Computing Machinery: New York, NY, USA, 2005; pp. 61–70. [Google Scholar] [CrossRef] [Green Version]
- Spycher, O.; Koenig, R.; Haenni, R.; Schläpfer, M. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. In Financial Cryptography and Data Security; Lecture Notes in Computer Science; Danezis, G., Ed.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7035, pp. 182–189. [Google Scholar] [CrossRef] [Green Version]
- Her, Y.S.; Saito, J.; Imamoto, K.; Sakurai, K. Security And Privacy in E-voting and RFID System Based on Universal. In Proceedings of the 2005 Symposium on Cryptography and Information Security, Istanbul, Turkey, 26–28 October 2005; pp. 907–912. [Google Scholar]
- Carroll, T.E.; Grosu, D. A Secure And Efficient Voter-Controlled Anonymous Election Scheme. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05)—Volume II, Las Vegas, NV, USA, 4–6 April 2005; Volume 1, pp. 721–726. [Google Scholar] [CrossRef] [Green Version]
- Zwierko, A.; Kotulski, Z. A Light-Weight e-Voting System With Distributed Trust. Electron. Notes Theor. Comput. Sci. 2007, 168, 109–126. [Google Scholar] [CrossRef] [Green Version]
- Clarkson, M.R.; Chong, S.; Myers, A.C. Civitas: Toward A Secure Voting System. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, USA, 18–22 May 2008; pp. 354–368. [Google Scholar] [CrossRef] [Green Version]
- Furukawa, J.; Mori, K.; Sako, K. An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in A Private Organization. In Towards Trustworthy Elections: New Directions in Electronic Voting; Lecture Notes in Computer Science; Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6000, pp. 141–154. [Google Scholar] [CrossRef]
- Lee, Y.; Park, S.; Mambo, M.; Kim, S.; Won, D. Towards Trustworthy e-Voting Using Paper Receipts. Comput. Stand. Interfaces 2010, 32, 305–311. [Google Scholar] [CrossRef] [Green Version]
- Bulens, P.; Giry, D.; Pereira, O. Running Mixnet-Based Elections With Helios. In 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11); USENIX Association: San Francisco, CA, USA, 2011; Volume 11, p. 6. [Google Scholar]
- Nguyen, T.A.T.; Dang, T.K. Enhanced Security In Internet Voting Protocol Using Blind Signature And Dynamic Ballots. Electron. Commer. Res. 2013, 13, 257–272. [Google Scholar] [CrossRef]
- Tamura, S.; Haddad, H.; Islam, N.; Alam, K. An Incoercible E-Voting Scheme Based On Revised Simplified Verifiable Re-encryption Mix-nets. Inf. Secur. Comput. Fraud 2015, 3, 32–38. [Google Scholar] [CrossRef]
- Alam, K.M.R.; Tamura, S.; Rahman, S.M.S.; Morimoto, Y. An Electronic Voting Scheme Based On Revised-SVRM And Confirmation Numbers. IEEE Trans. Dependable Secur. Comput. 2019, 18, 400–410. [Google Scholar] [CrossRef]
- Chang, D.; Chauhan, A.K.; Kang, J. Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. In Information Security and Cryptology—ICISC 2015; Lecture Notes in Computer Science; Kwon, S., Yun, A., Eds.; Springer International Publishing: Cham, Switzerland, 2016; Volume 9558, pp. 194–209. [Google Scholar] [CrossRef]
- McMurtry, E.; Boyen, X.; Culnane, C.; Gjøsteen, K.; Haines, T.; Teague, V. Towards Verifiable Remote Voting with Paper Assurance. arXiv 2021, arXiv:2111.04210. [Google Scholar]
- Rønne, P.B.; Ryan, P.Y.; Zollinger, M.L. Electryo, in-person voting with transparent voter verifiability and eligibility verifiability. arXiv 2021, arXiv:2105.14783. [Google Scholar]
- Tejedor-Romero, M.; Orden, D.; Marsa-Maestre, I.; Junquera-Sanchez, J.; Gimenez-Guzman, J.M. Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme. Electronics 2021, 10, 3075. [Google Scholar] [CrossRef]
- Ogata, W.; Kurosawa, K.; Sako, K.; Takatani, K. Fault Tolerant Anonymous Channel. In Information and Communications Security; Lecture Notes in Computer Science; Han, Y., Okamoto, T., Qing, S., Eds.; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1334, pp. 440–444. [Google Scholar] [CrossRef]
- Golle, P.; Zhong, S.; Boneh, D.; Jakobsson, M.; Juels, A. Optimistic Mixing For Exit-Polls. In Advances in Cryptology. ASIACRYPT 2002; Lecture Notes in Computer Science; Zheng, Y., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2501, pp. 451–465. [Google Scholar] [CrossRef] [Green Version]
- Adida, B. Helios: Web-Based Open-Audit Voting. In Proceedings of the 17th Conference on Security Symposium (SS’08), San Jose, CA, USA, 28 July–1 August 2008; USENIX Association: Washington, DC, USA, 2008; Volume 17, pp. 335–348. [Google Scholar]
- Benaloh, J. Simple Verifiable Elections. In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, EVT’06, Vancouver, BC, Canada, 1 August 2006; USENIX Association: Washington, DC, USA, 2006; p. 5. [Google Scholar] [CrossRef]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology. EUROCRYPT ’99; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1592, pp. 223–238. [Google Scholar] [CrossRef] [Green Version]
- Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- ElGamal, T. A Public Key Cryptosystem And A Signature Scheme Based On Discrete Logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Peng, K.; Bao, F. Efficient Multiplicative Homomorphic E-Voting. In Information Security; Lecture Notes in Computer Science; Burmester, M., Tsudik, G., Magliveras, S., Ilić, I., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6531, pp. 381–393. [Google Scholar] [CrossRef]
- Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC ’09, Bethesda, MD, USA, 31 May–2 June 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 169–178. [Google Scholar] [CrossRef] [Green Version]
- Cohen, J.D.; Fischer, M.J. A Robust and Verifiable Cryptographically Secure Election Scheme. In Proceedings of the 26th Annual Symposium on Foundations of Computer Science, SFCS ’85, Washington, DC, USA, 21–23 October 1985; pp. 372–382. [Google Scholar] [CrossRef]
- Peng, K.; Aditya, R.; Boyd, C.; Dawson, E.; Lee, B. Multiplicative Homomorphic E-Voting. In Progress in Cryptology–INDOCRYPT 2004; Lecture Notes in Computer Science; Canteaut, A., Viswanathan, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3348, pp. 61–72. [Google Scholar] [CrossRef]
- Benaloh, J.C.; Yung, M. Distributing the Power of a Government to Enhance the Privacy of Voters. In Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC ’86, Calgary, AB, Canada, 11–13 November 1986; Association for Computing Machinery: New York, NY, USA, 1986; pp. 52–62. [Google Scholar] [CrossRef]
- Benaloh, J. Verifiable Secret-Ballot Elections. Ph.D. Thesis, Yale University, New Haven, CT, USA, 1987. [Google Scholar]
- Sako, K.; Kilian, J. Secure Voting Using Partially Compatible Homomorphisms. In Advances in Cryptology—CRYPTO ’94; Lecture Notes in Computer Science; Desmedt, Y.G., Ed.; Springer: Berlin/Heidelberg, Germany, 1994; Volume 839, pp. 411–424. [Google Scholar] [CrossRef] [Green Version]
- Benaloh, J.; Tuinstra, D. Receipt-Free Secret-Ballot Elections (Extended Abstract). In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC ’94, Montreal, QC, Canada, 23–25 May 1994; Association for Computing Machinery: New York, NY, USA, 1994; pp. 544–553. [Google Scholar] [CrossRef]
- Baudron, O.; Fouque, P.A.; Pointcheval, D.; Stern, J.; Poupard, G. Practical Multi-Candidate Election System. In Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computin, PODC ’01, Newport, RI, USA, 26–29 August 2001; Association for Computing Machinery: New York, NY, USA, 2001; pp. 274–283. [Google Scholar] [CrossRef] [Green Version]
- Hirt, M.; Sako, K. Efficient Receipt-Free Voting Based on Homomorphic Encryption. In Advances in Cryptology. EUROCRYPT 2000; Lecture Notes in Computer Science; Preneel, B., Ed.; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1807, pp. 539–556. [Google Scholar] [CrossRef] [Green Version]
- Lee, B.; Kim, K. Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. In Information Security and Cryptology. ICISC 2002; Lecture Notes in Computer Science; Lee, P.J., Lim, C.H., Eds.; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2587, pp. 389–406. [Google Scholar] [CrossRef]
- Lee, B.; Kim, K. Receipt-free Electronic Voting through Collaboration of Voter and Honest Verifier. In Proceedings of the JW-ISC2000, Okinawa, Japan, 25–26 January 2000; pp. 101–108. [Google Scholar]
- Hirt, M. Multi-Party Computation: Efficient Protocols, General Adversaries, and Voting. Ph.D. Thesis, ETH Zurich, Zürich, Switzerland, 2001. [Google Scholar]
- Magkos, E.; Burmester, M.; Chrissikopoulos, V. Receipt-freeness in Large-Scale Elections without Untappable Channels. In Towards the E-Society: E-Commerce, E-Business, and E-Government; IFIP International Federation for Information Processing; Schmid, B., Stanoevska-Slabeva, K., Tschammer, V., Eds.; Springer: Boston, MA, USA, 2001; Volume 74, pp. 683–693. [Google Scholar] [CrossRef] [Green Version]
- Damgård, I.; Jurik, M. A Generalisation, A Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In Public Key Cryptography. PKC 2001; Lecture Notes in Computer Science; Kim, K., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 1992, pp. 119–136. [Google Scholar] [CrossRef] [Green Version]
- Peng, K. Efficient Proof of Vote Validity without Honest-Verifier Assumption in Homomorphic E-Voting. J. Inf. Process. Syst. 2011, 7, 549–560. [Google Scholar] [CrossRef] [Green Version]
- Katz, J.; Myers, S.; Ostrovsky, R. Cryptographic Counters and Applications to Electronic Voting. In Advances in Cryptology. EUROCRYPT 2001; Lecture Notes in Computer Science; Pfitzmann, B., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2045, pp. 78–92. [Google Scholar] [CrossRef]
- Peng, K.; Bao, F. Efficient Proof of Validity of Votes in Homomorphic E-Voting. In Proceedings of the 2010 Fourth International Conference on Network and System Security, Melbourne, VIC, Australia, 1–3 September 2010; pp. 17–23. [Google Scholar] [CrossRef]
- Peng, K.; Bao, F. Efficient Vote Validity Check in Homomorphic Electronic Voting. In Information Security and Cryptology—ICISC 2008; Lecture Notes in Computer Science; Lee, P.J., Cheon, J.H., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5461, pp. 202–217. [Google Scholar] [CrossRef]
- Huszti, A. A Homomorphic Encryption-Based Secure Electronic Voting Scheme. Publ. Math. 2011, 79, 479–496. [Google Scholar] [CrossRef] [Green Version]
- Bernhard, D.; Cortier, V.; Pereira, O.; Smyth, B.; Warinschi, B. Adapting Helios For Provable Ballot Privacy. In Computer Security—ESORICS 2011; Lecture Notes in Computer Science; Atluri, V., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6879, pp. 335–354. [Google Scholar] [CrossRef] [Green Version]
- Yi, X.; Okamoto, E. Practical Remote End-to-End Voting Scheme. In Electronic Government and the Information Systems Perspective; Lecture Notes in Computer Science; Andersen, K.N., Francesconi, E., Åke, G., van Engers, T.M., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6866, pp. 386–400. [Google Scholar] [CrossRef]
- Shinde, S.S.; Shukla, S.; Chitre, D. Secure E-voting Using Homomorphic Technology. Int. J. Emerg. Technol. Adv. Eng. 2013, 3, 203–206. [Google Scholar]
- Àngels Cerveró, M.; Mateu, V.; Miret, J.M.; Sebé, F.; Valera, J. An Efficient Homomorphic E-Voting System over Elliptic Curves. In Electronic Government and the Information Systems Perspective. EGOVIS 2014; Lecture Notes in Computer Science; Kő, A., Francesconi, E., Eds.; Springer International Publishing: Cham, Switzerland, 2014; Volume 8650, pp. 41–53. [Google Scholar] [CrossRef]
- Kiayias, A.; Zacharias, T.; Zhang, B. An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Secur. Priv. 2017, 15, 14–23. [Google Scholar] [CrossRef]
- Yang, X.; Yi, X.; Nepal, S.; Kelarev, A.; Han, F. A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption. IEEE Access 2018, 6, 20506–20519. [Google Scholar] [CrossRef]
- Fan, X.; Wu, T.; Zheng, Q.; Chen, Y.; Alam, M.; Xiao, X. HSE-Voting: A Secure High-Efficiency Electronic Voting Scheme Based On Homomorphic Signcryption. Future Gener. Comput. Syst. 2020, 111, 754–762. [Google Scholar] [CrossRef]
- Fan, X.; Wu, T.; Zheng, Q.; Chen, Y.; Xiao, X. DHS-Voting: A Distributed Homomorphic Signcryption E-Voting. In Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019; Communications in Computer and Information Science; Wang, G., Bhuiyan, M.Z.A., di Vimercati, S.D.C., Ren, Y., Eds.; Springer: Singapore, 2019; Volume 1123, pp. 40–53. [Google Scholar] [CrossRef]
- Benaloh, J. Electionguard Preliminary Specification v0.85. Available online: https://github.com/microsoft/electionguard (accessed on 24 February 2022).
- Haines, T.; Goré, R.; Stodart, J. Machine-checking the universal verifiability of ElectionGuard. In Proceedings of the Nordic Conference on Secure IT Systems, Virtual Event, 3 March 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 57–73. [Google Scholar]
- Chaum, D. Blind Signatures for Untraceable Payments. In Advances in Cryptology; Chaum, D., Rivest, R.L., Sherman, A.T., Eds.; Springer: Boston, MA, USA, 1983; pp. 199–203. [Google Scholar] [CrossRef]
- Fujioka, A.; Okamoto, T.; Ohta, K. A Practical Secret Voting Scheme For Large Scale Elections. In Advances in Cryptology. AUSCRYPT ’92; Lecture Notes in Computer Science; Seberry, J., Zheng, Y., Eds.; Springer: Berlin/Heidelberg, Germany, 1993; Volume 718, pp. 244–251. [Google Scholar] [CrossRef]
- Zhang, F.; Kim, K. ID-Based Blind Signature and Ring Signature from Pairings. In Advances in Cryptology—ASIACRYPT 2002; Lecture Notes in Computer Science; Zheng, Y., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2501, pp. 533–547. [Google Scholar] [CrossRef] [Green Version]
- Kumar, M.; Chand, S.; Katti, C.P. A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature. IEEE Syst. J. 2020, 14, 2032–2041. [Google Scholar] [CrossRef]
- Cetinkaya, O.; Doganaksoy, A. A practical privacy preserving e-voting protocol using dynamic ballots. In Proceedings of the 2nd National Cryptology Symposium, Virtual, 11–14 January 2006; Citeseer: Forest Grove, OR, USA, 2006. [Google Scholar]
- Adewole, A.P.; Sodiya, A.; Arowolo, O. A receipt-free multi-authority e-voting system. Int. J. Comput. Appl. 2011, 30, 15–23. [Google Scholar]
- Schmid, M.; Grünert, A. Blind Signatures and Blind Signature E-Voting Protocols; University of Applied Science Biel: Bern, Switzerland, 2008. [Google Scholar]
- Ohkubo, M.; Miura, F.; Abe, M.; Fujioka, A.; Okamoto, T. An Improvement on a Practical Secret Voting Scheme. In International Workshop on Information Security; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1729, pp. 225–234. [Google Scholar] [CrossRef]
- Okamoto, T. An Electronic Voting Scheme. In Advanced IT Tools; Terashima, N., Altman, E., Eds.; IFIP—The International Federation for Information Processing; Springer: Boston, MA, USA, 1996; pp. 21–30. [Google Scholar] [CrossRef]
- Okamoto, T. Receipt-Free Electronic Voting Schemes For Large Scale Elections. In Security Protocols; Lecture Notes in Computer Science; Christianson, B., Crispo, B., Lomas, M., Roe, M., Eds.; Springer: Berlin/Heidelberg, Germany, 1998; Volume 1361, pp. 25–35. [Google Scholar] [CrossRef]
- Darwish, A.; Gendy, M. A New Cryptographic Voting Verifiable Scheme for E-Voting System Based on Bit Commitment and Blind Signature. Int. J. Swarm Intell. Evol. Comput. 2017, 6, 2. [Google Scholar] [CrossRef] [Green Version]
- Jan, J.K.; Chen, Y.Y.; Lin, Y. The Design of Protocol for e-Voting on the Internet. In Proceedings of the IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186), London, UK, 16–19 October 2001; pp. 180–189. [Google Scholar] [CrossRef]
- Magkos, E.; Chrissikopoulos, V. Equitably Fair Internet Voting. J. Internet Technol. 2002, 3, 187–192. [Google Scholar]
- Ibrahim, S.; Kamat, M.; Salleh, M.; Aziz, S. Secure E-voting With Blind Signature. In Proceedings of the 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings, Shah Alam, Malaysia, 14–15 January 2003; pp. 193–197. [Google Scholar] [CrossRef] [Green Version]
- Cetinkaya, O.; Koc, M.L. Practical Aspects of DynaVote e-Voting Protocol. Electron. J. E-Gov. 2009, 7, 327–338. [Google Scholar]
- Koenig, R.; Dubuis, E.; Haenni, R. Why Public Registration Boards Are Required in E-Voting Systems Based on Threshold Blind Signature Protocols. In Proceedings of the Electronic Voting 2010, EVOTE 2010—4th International Conference, Castle Hofen, Bregenz, Austria, 21–24 July 2010; Krimmer, R., Grimm, R., Eds.; pp. 255–266. [Google Scholar]
- Cruz, J.P.; Kaji, Y. E-voting System Based on the Bitcoin Protocol and Blind Signatures. IPSJ Trans. Math. Model. Its Appl. 2017, 10, 14–22. [Google Scholar]
- Zhang, L.; Hu, Y.; Tian, X.; Yang, Y. Novel Identity-Based Blind Signature for Electronic Voting System. In Proceedings of the 2010 Second International Workshop on Education Technology and Computer Science, Wuhan, China, 6–7 March 2010; Volume 2, pp. 122–125. [Google Scholar] [CrossRef]
- Kumar, M.; Katti, C.P.; Saxena, P.C. A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. In Information Systems Security. ICISS 2017; Lecture Notes in Computer Science; Shyamasundar, R.K., Singh, V., Vaidya, J., Eds.; Springer International Publishingg: Cham, Switzerland, 2017; Volume 10717, pp. 29–49. [Google Scholar] [CrossRef]
- Kucharczyk, M. Blind Signatures in Electronic Voting Systems. In Computer Networks; Communications in Computer and Information Science; Kwiecień, A., Gaj, P., Stera, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 79, pp. 349–358. [Google Scholar] [CrossRef]
- Mohanty, S.; Majhi, B. A Secure Multi Authority Electronic Voting Protocol Based on Blind Signature. In Proceedings of the 2010 International Conference on Advances in Computer Engineering, Bangalore, India, 20–21 June 2010; pp. 271–273. [Google Scholar] [CrossRef]
- Buccafurri, F.; Fotia, L.; Lax, G. Allowing Continuous Evaluation of Citizen Opinions through Social Networks. In Advancing Democracy, Government and Governance. EGOVIS/EDEM 2012; Lecture Notes in Computer Science; Kő, A., Leitner, C., Leitold, H., Prosser, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7452, pp. 242–253. [Google Scholar] [CrossRef]
- Song, F.; Cui, Z. Electronic Voting Scheme about Elgamal Blind-Signatures Based on XML. Procedia Eng. 2012, 29, 2721–2725. [Google Scholar] [CrossRef] [Green Version]
- López-García, L.; Perez, L.J.D.; Rodríguez-Henríquez, F. A Pairing-Based Blind Signature E-Voting Scheme. Comput. J. 2014, 57, 1460–1471. [Google Scholar] [CrossRef]
- Chen, C.L.; Chen, Y.Y.; Jan, J.K.; Chen, C.C. A Secure Anonymous e-Voting System Based on Discrete Logarithm Problem. Appl. Math. Inf. Sci. 2014, 8, 2571–2578. [Google Scholar] [CrossRef]
- García, D.L. A Flexible e-Voting Scheme For Debate Tools. Comput. Secur. 2016, 56, 50–62. [Google Scholar] [CrossRef] [Green Version]
- Kumar, M.; Katti, C.; Saxena, P. An Identity-Based Blind Signature Approach For E-voting System. Int. J. Mod. Educ. Comput. Sci. 2017, 9, 47–54. [Google Scholar] [CrossRef] [Green Version]
- Boldyreva, A. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In Public Key Cryptography. PKC 2003; Lecture Notes in Computer Science; Desmedt, Y.G., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2567, pp. 31–46. [Google Scholar] [CrossRef] [Green Version]
- Choon, J.C.; Cheon, J.H. An Identity-Based Signature from Gap Diffie-Hellman Groups. In Public Key Cryptography. PKC 2003; Lecture Notes in Computer Science; Desmedt, Y.G., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2567, pp. 18–30. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Lynn, B.; Shacham, H. Short Signatures From The Weil Pairing. In Advances in Cryptology. ASIACRYPT 2001; Lecture Notes in Computer Science; Boyd, C., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 514–532. [Google Scholar] [CrossRef] [Green Version]
- Aziz, A. Coercion-Resistant E-Voting Scheme with Blind Signatures. In Proceedings of the 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, Australia, 8–9 May 2019; pp. 143–151. [Google Scholar] [CrossRef]
- Waheed, A.; Din, D.N.; Umar, A.; Ullah, R.; Amin, U. Novel Blind Signcryption Scheme for E-Voting System Based on Elliptic Curves. Mehran Univ. Res. J. Eng. Technol. 2021, 40, 314–322. [Google Scholar] [CrossRef]
- Jafar, U.; Aziz, M.J.A. A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. In Advances in Cyber Security; Communications in Computer and Information Science; Anbar, M., Abdullah, N., Manickam, S., Eds.; Springer: Singapore, 2021; Volume 1347, pp. 248–266. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Q. An E-voting Protocol Based On Blockchain. IACR Cryptol. EPrint Arch. 2017, 2017, 1043. [Google Scholar]
- Park, S.; Specter, M.; Narula, N.; Rivest, R.L. Going from bad to worse: From internet voting to blockchain voting. J. Cybersecur. 2021, 7, 25. [Google Scholar] [CrossRef]
- National Academies of Sciences, Engineering, and Medicine. Securing the Vote: Protecting American Democracy; The National Academies Press: Washington, DC, USA, 2018. [Google Scholar] [CrossRef]
- West Virginia Secretary of State’s Office. 24 Counties to Offer Mobile Voting Option for Military Personnel Overseas. 2018. Available online: https://sos.wv.gov/news/Pages/09-20-2018-A.aspx (accessed on 2 December 2021).
- West Virginia Secretary of State’s Office. Warner Pleased with Participation in Test Pilot for Mobile Voting. 2018. Available online: https://sos.wv.gov/news/Pages/11-16-2018-A.aspx (accessed on 2 December 2021).
- McCorry, P.; Shahandashti, S.F.; Hao, F. A Smart Contract For Boardroom Voting With Maximum Voter Privacy. In Financial Cryptography and Data Security; Kiayias, A., Ed.; Springer International Publishing: Cham, Switzerland, 2017; Volume 10322, pp. 357–375. [Google Scholar] [CrossRef] [Green Version]
- Gong, B.; Lu, X.; Fat, L.W.; Au, M.H. Blockchain-Based Threshold Electronic Voting System. In Security and Privacy in Social Networks and Big Data; Communications in Computer and Information Science; Meng, W., Furnell, S., Eds.; Springer: Singapore, 2019; Volume 1095, pp. 238–250. [Google Scholar] [CrossRef]
- Gao, S.; Zheng, D.; Guo, R.; Jing, C.; Hu, C. An Anti-Quantum E-Voting Protocol in Blockchain with Audit Function. IEEE Access 2019, 7, 115304–115316. [Google Scholar] [CrossRef]
- Chaieb, M.; Yousfi, S. LOKI Vote: A Blockchain-Based Coercion Resistant E-Voting Protocol. In Information Systems. EMCIS 2020; Lecture Notes in Business Information Processing; Themistocleous, M., Papadaki, M., Kamal, M.M., Eds.; Springer International Publishing: Cham, Switzerland, 2020; Volume 402, pp. 151–168. [Google Scholar] [CrossRef]
- Zhou, Y.; Liu, Y.; Jiang, C.; Wang, S. An Improved FOO Voting Scheme Using Blockchain. Int. J. Inf. Secur. 2020, 19, 303–310. [Google Scholar] [CrossRef]
- Priya, K.L.S.; Rupa, C. Block chain technology based electoral franchise. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 5–7 March 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Zaghloul, E.; Li, T.; Ren, J. d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting. IEEE Internet Things J. 2021, 8, 16585–16597. [Google Scholar] [CrossRef]
- Kim, H.; Kim, K.E.; Park, S.; Sohn, J. E-voting System Using Homomorphic Encryption and Blockchain Technology to Encrypt Voter Data. arXiv 2021, arXiv:2111.05096. [Google Scholar]
- Lu, N.; Xu, X.; Choi, C.; Fei, T.; Shi, W. BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness. Secur. Commun. Netw. 2021, 2021. [Google Scholar] [CrossRef]
- Ye, K.; Zheng, D.; Guo, R.; He, J.; Chen, Y.; Tao, X. A Coercion-Resistant E-Voting System Based on Blockchain Technology. Int. J. Netw. Secur. 2021, 23, 791–806. [Google Scholar]
- Rathore, D.; Ranga, V. Secure Remote E-Voting using Blockchain. In Proceedings of the 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 6–8 May 2021; pp. 282–287. [Google Scholar] [CrossRef]
- ul Hassan, C.A.; Hammad, M.; Iqbal, J.; Hussain, S.; Ullah, S.S.; AlSalman, H.; Mosleh, M.A.; Arif, M. A Liquid Democracy Enabled Blockchain-Based Electronic Voting System. Sci. Program. 2022, 2022. [Google Scholar] [CrossRef]
- ElSheikh, M.; Youssef, A.M. Dispute-free Scalable Open Vote Network using zk-SNARKs. arXiv 2022, arXiv:2203.03363. [Google Scholar]
- Srivastava, G.; Dwivedi, A.D.; Singh, R. PHANTOM Protocol as the New Crypto-Democracy. In Computer Information Systems and Industrial Management; Saeed, K., Homenda, W., Eds.; Springer International Publishing: Cham, Switzerland, 2018; Volume 11127, pp. 499–509. [Google Scholar] [CrossRef]
- Srivastava, G.; Dwivedi, A.D.; Singh, R. Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology. In Proceedings of the ICETE, Hyderabad, India, 22–23 March 2018; pp. 674–679. [Google Scholar]
- Araújo, R.; Traoré, J. A Practical Coercion Resistant Voting Scheme Revisited. In E-Voting and Identify. Vote-ID 2013; Lecture Notes in Computer Science; Heather, J., Schneider, S., Teague, V., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; Volume 7985, pp. 193–209. [Google Scholar] [CrossRef]
- Xu, R.; Huang, L.; Yang, W.; He, L. Quantum Group Blind Signature Scheme Without Entanglement. Opt. Commun. 2011, 284, 3654–3658. [Google Scholar] [CrossRef]
- Chillotti, I.; Gama, N.; Georgieva, M.; Izabachène, M. A Homomorphic LWE Based E-voting Scheme. In Post-Quantum Cryptography; Lecture Notes in Computer Science; Takagi, T., Ed.; Springer International Publishing: Cham, Switzerland, 2016; Volume 9606, pp. 245–265. [Google Scholar] [CrossRef]
- Aziz, A.; Qunoo, H.; Abusamra, A. Using Homomorphic Cryptographic Solutions on E-voting Systems. Int. J. Comput. Netw. Inf. Secur. 2018, 10, 44–59. [Google Scholar] [CrossRef]
- Rønne, P.B.; Atashpendar, A.; Gjøsteen, K.; Ryan, P.Y.A. Short Paper: Coercion-Resistant Voting in Linear Time Via Fully Homomorphic Encryption. In Financial Cryptography and Data Security; Lecture Notes in Computer Science; Bracciali, A., Clark, J., Pintore, F., Rønne, P.B., Sala, M., Eds.; Springer International Publishing: Cham, Switzerland, 2020; Volume 11599, pp. 289–298. [Google Scholar] [CrossRef]
- Boyen, X.; Haines, T.; Müller, J. A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. In Computer Security. ESORICS 2020; Lecture Notes in Computer Science; Chen, L., Li, N., Liang, K., Schneider, S., Eds.; Springer International Publishing: Cham, Switzerland, 2020; Volume 12309, pp. 336–356. [Google Scholar] [CrossRef]
- Liao, G. Multi-Candidate Electronic Voting Scheme Based on Fully Homomorphic Encryption. J. Phys. Conf. Ser. 2020, 1678, 012064. [Google Scholar] [CrossRef]
- Feng, H.; Liu, J.; Wu, Q.; Li, Y.N. Traceable Ring Signatures with Post-quantum Security. In Topics in Cryptology—CT-RSA 2020; Jarecki, S., Ed.; Springer International Publishing: Cham, Switzerland, 2020; pp. 442–468. [Google Scholar]
- Farzaliyev, V.; Willemson, J.; Kaasik, J.K. Improved Lattice-Based Mix-Nets for Electronic Voting. Cryptol. ePrint Archive, Report 2021/1499. 2021. Available online: https://ia.cr/2021/1499 (accessed on 27 March 2022).
- Kaim, G.; Canard, S.; Roux-Langlois, A.; Traoré, J. Post-quantum Online Voting Scheme. In Financial Cryptography and Data Security. FC 2021 International Workshops; Springer: Berlin/Heidelberg, Germany, 2021; Volume 12676, pp. 290–305. [Google Scholar] [CrossRef]
- Kiayias, A.; Yung, M. The Vector-Ballot e-Voting Approach. In Financial Cryptography; Lecture Notes in Computer Science; Juels, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3110, pp. 72–89. [Google Scholar] [CrossRef] [Green Version]
- Aditya, R. Secure Electronic Voting with Flexible Ballot Structure. Ph.D. Thesis, Information Security Institute, Queensland University of Technology, Brisbane, Australia, 2005. [Google Scholar]
- Peng, K. A Hybrid E-Voting Scheme. In Information Security Practice and Experience; Lecture Notes in Computer Science; Bao, F., Li, H., Wang, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5451, pp. 195–206. [Google Scholar] [CrossRef]
- Hussien, H.; Aboelnaga, H. Design of a Secured e-Voting System. In Proceedings of the 2013 International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia, 20–22 January 2013; pp. 1–5. [Google Scholar] [CrossRef]
- Mateu, V.; Miret, J.M.; Sebe, F. A Hybrid Approach To Vector-Based Homomorphic Tallying Remote Voting. Int. J. Inf. Secur. 2016, 15, 211–221. [Google Scholar] [CrossRef]
- Esgin, M.F.; Zhao, R.K.; Steinfel, R.; Liu, J.K.; Liu, D. MatRiCT: Efficient, Scalable And Post-Quantum Blockchain Confidential Transactions Protocol. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, London, UK, 11–15 November 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 567–584. [Google Scholar] [CrossRef]
- Fernandez-Carames, T.M.; Fraga-Lamas, P. Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 2020, 8, 21091–21116. [Google Scholar] [CrossRef]
- McEliece, R.J. A Public-Key Cryptosystem Based On Algebraic. Coding Thv 1978, 4244, 114–116. [Google Scholar]
- Kho, Y.X.; Heng, S.H. Comparison Analysis of Cryptographic Electronic Systems. In Proceedings of the 7th International Cryptology and Information Security Conference 2020, CRYPTOLOGY 2020, Putrajaya, Malaysia, 9–10 June 2020; pp. 151–164. [Google Scholar]
Approach | Advantages | Disadvantages |
---|---|---|
Mix-net-Based e-Voting |
|
|
Homomorphic e-Voting |
|
|
Blind Signature-Based e-Voting |
|
|
Blockchain-Based e-Voting |
|
|
Post-Quantum e-Voting |
|
|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kho, Y.-X.; Heng, S.-H.; Chin, J.-J. A Review of Cryptographic Electronic Voting. Symmetry 2022, 14, 858. https://doi.org/10.3390/sym14050858
Kho Y-X, Heng S-H, Chin J-J. A Review of Cryptographic Electronic Voting. Symmetry. 2022; 14(5):858. https://doi.org/10.3390/sym14050858
Chicago/Turabian StyleKho, Yun-Xing, Swee-Huay Heng, and Ji-Jian Chin. 2022. "A Review of Cryptographic Electronic Voting" Symmetry 14, no. 5: 858. https://doi.org/10.3390/sym14050858
APA StyleKho, Y. -X., Heng, S. -H., & Chin, J. -J. (2022). A Review of Cryptographic Electronic Voting. Symmetry, 14(5), 858. https://doi.org/10.3390/sym14050858