Abstract
E-voting is a kind of election in which voters use digital ballots to present their civil rights, and e-voting gradually becomes an essential need for every organization and nation. There are some requirements in the e-voting process: confidential, integrity, authentication, and privacy of ballot. As a result, conducting an e-voting protocol is an important task to ensure the security requirements for e-voting process. In the previous works, researchers have proposed some properties of an esoteric e-voting protocol. The result of analyzing existed protocols shows that these protocols do not fully match properties of the esoteric protocol yet. In this paper, a new protocol which can meet requirements better than the formers is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)
Anisimov, V.A., Anisimov, V.V.: Кpиптoгpaфичecкиe мeтoды зaщиты инфopмaции (2015)
Masram, R., Shahare, V., Abraham, J., Moona, R.: Analysis and comparison of symmetric key cryptographic algorithms based on various file features. Int. J. Netw. Secur. Appl. 6(4), 43 (2014)
Alanazi, H., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New comparative study between DES, 3DES and AES within nine factors (2010)
Goldsmith, B., Ruthrauff, H.: Implementing and overseeing electronic voting and counting technologies (2013). pdf.usaid.gov/pdf_docs/PBAAC136.pdf. Accessed 20 Aug 2017
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) Advances in Cryptology - AUSCRYPT 1992. Lecture Notes in Computer Science, vol. 718, pp. 244–251. Springer (1992)
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC 1994, pp. 544–553. ACM, New York (1994)
Knudsen, L.R., Robshaw, M.J.B.: Brute force attacks. In: The Block Cipher Companion, pp. 95–108. Springer, Heidelberg (2011)
Cranor, L.F., Cytron, R.K.: Sensus: a security-conscious electronic polling system for the internet. In: Proceedings of the Hawaii International Conference on System Sciences. IEEE (1997)
Whitman, M.E., Mattord, H.J.: Principles of Information Security, 4th edn. (2012)
Nurmi, H., Salomaa, A., Santean, L.: Secret ballot elections in computer networks. Comput. Secur. 10(6), 553–560 (1991)
Faria, P.V.C.L.: Remote Electronic Voting, Universidade do Minho (2012)
Schneier, B.: Protocols, algorithms, source code in C. In: Schneier, B. (ed.) Applied Cryptography, 816 p. Triumph (2002)
Dolmatov, V.: GOST R 34.10-2001: Digital Signature Algorithm. Independent Submission, Request for Comments 5832. ISSN 2070-1721
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Tho, H.D., Ha, N.T.H. (2018). A Protocol for Securing E-Voting System. In: Duy, V., Dao, T., Zelinka, I., Kim, S., Phuong, T. (eds) AETA 2017 - Recent Advances in Electrical Engineering and Related Sciences: Theory and Application. AETA 2017. Lecture Notes in Electrical Engineering, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-69814-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-69814-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69813-7
Online ISBN: 978-3-319-69814-4
eBook Packages: EngineeringEngineering (R0)