Defense Method against an Attack of Incorrect Ballot Filling in a Remote Electronic Voting System

Cover Page

Cite item

Full Text

Abstract

The remote electronic voting system based on homomorphic encryption and blockchain technologies is analyzed. The existing methods of protecting the voting system from an attack related to incorrect filling a ballot by the voter are studied. The method to protect against an attack of violation of the rules for filling a ballot as a whole is developed, which increases the security of voting system by ensuring secrecy of total number of votes given by voter during the verification correctness of filling a ballot.

About the authors

V. A. Yakovlev

The Bonch-Bruevich Saint-Petersburg State University of Telecommunications

Email: yakovlev.va@sut.ru
ORCID iD: 0009-0007-2861-9605

V. D. Salman

The Bonch-Bruevich Saint-Petersburg State University of Telecommunications

Email: salman.vd@sut.ru
ORCID iD: 0000-0003-4454-7844

References

  1. Adida B. Helios: Web-based open-audit voting // Proceedings of the 17th USENIX Security Symposium (San Jose, USA, 28–29 July 2008). 2008. PP. 335–348.
  2. Fujioka A., Okamoto T., Ohta K. A practical secret voting scheme for large scale elections // Proceedings of the Advances in Cryptology ‒ AUSCRYPT '92 (Gold Coast, Queensland, Australia, 13‒16 December 1992). Lecture Notes in Computer Science. Vol. 718. Berlin, Heidelberg: Springer, 1993. PP. 245–251. doi: 10.1007/3-540-57220-1_66
  3. Killer C., Rodrigues B., Scheid E.J., Franco M., Eck M., Zaugg N. Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System // Proceedings of the 45th Conference on Local Computer Networks (LCN, Sydney, Australia, 16‒19 November 2020). IEEE, 2020. PP. 172–183. doi: 10.1109/LCN48667.2020.9314815
  4. Suganya R., Sureshkumar A., Alaguvathana P., Priyadharshini S., Jeevanantham K. Blockchain Based Secure Voting System Using Iot // International Journal of Future Generation Communication and Networking. 2020. Vol. 13. Iss. 3. PP. 2134–2142.
  5. Rasid N.H. Blockchain Technology in e-Voting: Comparative Study. 2020.
  6. Ayed A.B. A Conceptual Secure Blockchain Based Electronic Voting System // International Journal of Network Security & Its Applications. 2017. Vol. 9. Iss. 3. PP. 1–9. doi: 10.5121/ijnsa.2017.9301
  7. Программно-технический комплекс, обеспечивающий дистанционное электронное голосование избирателей (участников референдума) вне зависимости от места их нахождения. Описание ПТК ДЭГ. 2021. URL: https://evoting.digitaldem.ru/wp-content/uploads/sites/2/2021/07/ptkdeg_general_description_2021-07-15.pdf (дата обращения 07.09.2023)
  8. КриптоВече. Инструкция к системе Базовое описание информационной системы «КриптоВече».
  9. Dagher G.G., Marella P.B., Milojkovic M., Mohler J. BroncoVote: Secure Voting System Using Ethereum’s Blockchain // Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP, Funchal, Portugal, 22‒24 January 2018). Vol. 1. 2018. PP. 96–107. doi: 10.5220/0006609700960107
  10. Yu B., Liu J., Sakzad A., Nepal S., Rimba P., Steinfeld R., Au M.H. Platform-Independent Secure Blockchain-Based Voting System // Cryptology ePrint Archive. 2018. URL: https://eprint.iacr.org/2018/657 (дата обращения 07.09.2023)
  11. Hsiao J.-H., Tso R., Chen C.-M., Wu M.-E. Decentralized E-Voting Systems Based on the Blockchain Technology // Proceedings of the International Conference on Computing Systems and Applications on Advances in Computer Science and Ubiquitous Computing (Taichung, Taiwan, 18‒20 December 2017). Lecture Notes in Electrical Engineering. Vol. 474. Singapore: Springer, 2018. PP. 305–309. doi: 10.1007/978-981-10-7605-3_50
  12. Cramer R., Damgård I., Schoenmakers B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols // Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’94, Santa Barbara, USA, 21–25 August 1994). Lecture Notes in Computer Science. Vol. 839. Berlin, Heidelberg: Springer, 1994. PP. 174–187. doi: 10.1007/3-540-48658-5_19
  13. Cramer R., Gennaro R., Schoenmakers B. A secure and optimally efficient multiauthority election scheme // European Transactions on Telecommunications. 1997. Vol. 8. Iss. 5. PP. 481–490. doi: 10.1002/ett.4460080506
  14. Elgamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms // IEEE Transactions on Information Theory. 1985. Vol. 31. Iss. 4. PP. 469–472. doi: 10.1109/TIT.1985.1057074
  15. Chaum D., Pedersen T.P. Wallet Databases with Observers // Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’94, Santa Barbara, USA, 16–20 August 1992). Lecture Notes in Computer Science. Vol. 740. Berlin, Heidelberg: Springer, 1994. PP. 89–105. doi: 10.1007/3-540-48071-4_7
  16. Яковлев В.А., Салман В.Д. Методы защиты от угрозы неправильного заполнения избирательного бюллетеня в системе дистанционного электронного голосования // Труды учебных заведений связи. 2023. Т. 9. № 2. С. 128–142. doi: 10.31854/1813-324X-2023-9-2-128-142
  17. Mohr A. A Survey of Zero-Knowledge Proofs with Applications to Cryptography. URL: http://austinmohr.com/Work_files/zkp.pdf (дата обращения 07.09.2023)

Supplementary files

Supplementary Files
Action
1. JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Согласие на обработку персональных данных

 

Используя сайт https://journals.rcsi.science, я (далее – «Пользователь» или «Субъект персональных данных») даю согласие на обработку персональных данных на этом сайте (текст Согласия) и на обработку персональных данных с помощью сервиса «Яндекс.Метрика» (текст Согласия).