Electronic voting protocol from bilinear pairings

Authors

  • Gina Gallegos García IPN ESIME Culhuacan
  • Roberto Gómez Cárdenas ITESM-CEM
  • Gonzalo Duchén Sánchez IPN ESIME Culhuacan

DOI:

https://doi.org/10.17533/udea.redin.14672

Keywords:

threshold schemes, blind signature schemes, electronic votin, bilinear pairings

Abstract

Electronic voting has been an active research area since two decades, which involves using information systems and cryptographic schemes in order to reduce costs and human mistakes as well as increase process speed, without discard its security. In the literature there exist some proposals, which are based on the difficult to resolve mathematical problems such as: prime factorization or discrete logarithm, both of them from Public Key Cryptography. In this paper we describe an electronic voting protocol that meets privacy, transparency and robustness by using a scheme from Identity Based Cryptography. The proposed protocol is divided in four main phases: set-up, authentication, voting and counting and involves a distributed responsibility model, with t out of n entities that are required during the counting phase to decrypt the votes. The paper includes a correctness test to show how the protocol works.

|Abstract
= 320 veces | PDF (ESPAÑOL (ESPAÑA))
= 101 veces|

Downloads

Download data is not yet available.

References

O. Cetinkaya, D. Cetinkaya, “Verification and Validation Issues in Electronic Voting” The Electronic Journal of e-Government, Vol. 5. 2007, pp 117 – 126.

D.R. Kuhn, V. C. Hu, W. T. Polk, S-J. Chang, Introduction to Public Key Technology and the Federal PKI Infrastructure, National Institute of Standards and Technology, SP 800-32, 2001, pp. 5-27. DOI: https://doi.org/10.6028/NIST.SP.800-32

A. Shamir, “Identity-based cryptosystems and signature schemes”, Advances in Cryptology Crypto´84, Springer-Verlag, LNCS 196. Santa Bárbara (CA). 1985. pp. 47-53. DOI: https://doi.org/10.1007/3-540-39568-7_5

D. Boneh, M. Franklin, “Identity-based encryption from the Weil Pairing”, SIAM Journal of Computing, Vol. 32. 2003. pp. 586-615. DOI: https://doi.org/10.1137/S0097539701398521

M. Scott, N. Benger, M. Charlemagne, L. J. Dominguez and E. J. Kachisa, “On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves”. Pairing 2009. Springer-Verlag. LNCS 5671. 2009. pp. 78-88. DOI: https://doi.org/10.1007/978-3-642-03298-1_6

A. Boldyreva, “Efficient Threshold Siganture, Multisignature and Blind Signature Schemes based on the Gap-Diffie-Hellman-Group Siganture Scheme”. PKC 2003. Springer-Verlag, LNCS 2139. Miami (FL). 2003. pp. 31-46. DOI: https://doi.org/10.1007/3-540-36288-6_3

B. Libert and J. Quisquarter, “Efficient Revocation and Threshold Pairing Based Cryptosystems”, ACM Annual Symposium on Principles of Distributed Computing, PODC. Boston (MA). 2003. pp. 163-171. DOI: https://doi.org/10.1145/872035.872059

A. Shamir. How to share a secret. Ed. Communications ACM 22. New York. 1979. pp. 612-613. DOI: https://doi.org/10.1145/359168.359176

A. Fujioka, T. Okamoto and Ohta K., “A practical secret voting scheme for large scale elections”, Advances in Cryptology – AUSCRYPT ’92, LNCS 718, Springer – Verlag. Queensland (Australia). 1993. pp. 244-251. DOI: https://doi.org/10.1007/3-540-57220-1_66

Lourdes López-García, Francisco Rodríguez- Henríquez and Miguel Ángel, León-Chávez, “An E-Voting Protocol Based on Pairing Blind Signatures” Poster Session of International Conference on Security and Cryptography, Secrypt 2008. Porto (Portugal).

Sung-Hyun Yun Sung-Jin Lee, “An electronic voting scheme based on undeniable blind signature scheme”, Proc. of the 37th Annual 2003 International Carnahan Conference on Security Technology, IEEE Computer Society. Taipei (Taiwan). 2003. pp. 163-167.

B. Kharchineh and M. Ettelaee, “A New Electronic Voting Protocol Using a New Blind Signature Scheme”, Proc. of the Second International Conference on Future Networks, 2010, IEEE Computer Society. Sanya (China). 2010. pp. 190-194. DOI: https://doi.org/10.1109/ICFN.2010.40

D. Chaum, “Elections with unconditionally secrets ballots and disruption equivalent to breaking RSA”, Proc. of Eurocrypt ’88, Davos. Switzerland. 1988. pp. 177-182 DOI: https://doi.org/10.1007/3-540-45961-8_15

R. Cramer, R. Gennaro and B. Schoenmrkers, “A Secure and Optimally Efficient Multi-Authority Election Scheme”, Proc. of EUROCRYPT ’97, Springer – Verlag, LNCS 1233. Konstanz (Germany). 1997. pp. 103-118. DOI: https://doi.org/10.1007/3-540-69053-0_9

O. Baudron, P. Fouque, D. Pointcheval, G. Poupard and J. Stern, “Practical multi-candidate election system”, ACM Annual Symposium on Principles of Distributed Computing, PODC 2001. New Port (RI). 2001. pp 274-283. DOI: https://doi.org/10.1145/383962.384044

Published

2013-02-28

How to Cite

Gallegos García, G., Gómez Cárdenas, R., & Duchén Sánchez, G. (2013). Electronic voting protocol from bilinear pairings. Revista Facultad De Ingeniería Universidad De Antioquia, (56), 234–244. https://doi.org/10.17533/udea.redin.14672