<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-2-102-109</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-170</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ТРУДЫ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>YOUNG SCHOLARS RESEARCH</subject></subj-group></article-categories><title-group><article-title>Анализ гомоморфных криптосистем Бенало и Пэйе для построения системы электронного голосования</article-title><trans-title-group xml:lang="en"><trans-title>Analysis of Homomorphic Cryptosystems of Benaloh and Paillier for the Construction of an Electronic Voting System</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4454-7844</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Салман</surname><given-names>В. Д.</given-names></name><name name-style="western" xml:lang="en"><surname>Salman</surname><given-names>W. D.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Салман Васан Давуд  – аспирант кафедры защищенных систем связи </p><p>Санкт-Петербург, 193232</p></bio><bio xml:lang="en"><p>St. Petersburg, 193232</p></bio><email xlink:type="simple">wasan.salman@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>25</day><month>09</month><year>2021</year></pub-date><volume>7</volume><issue>2</issue><fpage>102</fpage><lpage>109</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Салман В.Д., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Салман В.Д.</copyright-holder><copyright-holder xml:lang="en">Salman W.D.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/170">https://tuzs.sut.ru/jour/article/view/170</self-uri><abstract><p>Проведен анализ двух криптографических алгоритмов (Пэйе и Бенало) с целью их применения для построения систем электронного голосования. Дано описание каждого алгоритма и их гомоморфных свойств. Сформулированы требования к системам электронного голосования и приведено их построение при использовании этих криптоалгоритмов. Сравнительный анализ систем голосования на основе схем Пэйе и Бенало показал, что схема Пэйе является лучшим и более простым методом построения безопасных электронных систем голосования, в то время как схема Бенало является более сложной.</p><p> </p></abstract><trans-abstract xml:lang="en"><p>The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.</p><p> </p></trans-abstract><kwd-group xml:lang="ru"><kwd>гомоморфное шифрование</kwd><kwd>криптосистема Пэйе</kwd><kwd>криптосистема Бенало</kwd><kwd>электронная система голосования</kwd></kwd-group><kwd-group xml:lang="en"><kwd>homomorphic encryption</kwd><kwd>Paillier cryptosystem</kwd><kwd>Benaloh cryptosystem</kwd><kwd>electronic voting system</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И, Яковлев В.А. Основы криптографии: учебное пособие. СПб.: ИЦ Интермедия, 2016. 296 c.</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Yakovlev V.A. Fundamentals of Cryptography. St. Petersburg: IC Intermedia Publ.; 2016. 296 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Jabbar I., Alsaad N.S. Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption // International Journal of Network Security. 2017. Vol. 19. № 5. PP. 694‒703. DOI:10.6633/IJNS.201709.19(5).06</mixed-citation><mixed-citation xml:lang="en">Jabbar I., Alsaad N.S. Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption. International Journal of Network Security. 2017;19(5):694–703. DOI: 10.6633/IJNS.201709.19(5).06</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Singh A., Ramakanth K., Cholli P., Nagaraj G. Empowering E-governance with E-voting // Indonesian Journal of Electrical Engineering and Computer Science. 2018. Vol.12. PP. 1081‒1086. DOI:10.11591/ijeecs.v12.i3.pp1081-1086</mixed-citation><mixed-citation xml:lang="en">Singh A., Ramakanth K., Cholli P., Nagaraj G. Empowering E-governance with E-voting. Indonesian Journal of Electrical Engineering and Computer Science. 2018;12:1081‒1086. DOI:10.11591/ijeecs.v12.i3.pp1081-1086</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Benaloh J.C. Verifiable Secret-Ballot Elections. PhD Thesis. Yale University, 1996. 134 p.</mixed-citation><mixed-citation xml:lang="en">Benaloh J.C. Verifiable Secret-Ballot Elections. PhD Thesis. Yale University; 1996. 134 p.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Gennaro R., Halevi S., Rabin T. Secure Hash-and-Sign Signatures without the Random Oracle // Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1999, Prague Czech Republic, 2–6 May 1999). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1999. PP. 123–139. DOI:10.1007/3-54048910-X_9</mixed-citation><mixed-citation xml:lang="en">Gennaro R., Halevi S., Rabin T. Secure Hash-and-Sign Signatures without the Random Oracle. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999, 2–6 May 1999, Prague, Czech Republic. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 1999. p.123–139. DOI:10.1007/3-540-48910-X_9</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Fontaine C., Galand F. A Survey of Homomorphic Encryption for Nonspecialists // EURASIP Journal on Information Security. 2007. Vol. 2007. DOI:10.1155/2007/13801</mixed-citation><mixed-citation xml:lang="en">Fontaine C., Galand F. A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal on Information Security. 2007;2007. DOI:10.1155/2007/13801</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Morris L. Analysis of Partially and Fully Homomorphic Encryption. Rochester: Rochester Institute of Technology, 2013.</mixed-citation><mixed-citation xml:lang="en">Morris L. Analysis of Partially and Fully Homomorphic Encryption. Rochester: Rochester Institute of Technology; 2013.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Bhumika P., Dharmendra B. Homomorphic Encryption: Privacy Preserving Amicable E-voting System // International Journal of Computer Sciences and Engineering. 2019. Vol. 7. Iss. 12. PP. 46‒50. DOI:10.26438/ijcse/v7i12.4650</mixed-citation><mixed-citation xml:lang="en">Bhumika P., Dharmendra B. Homomorphic Encryption: Privacy Preserving Amicable E-voting System. International Journal of Computer Sciences and Engineering. 2019;7(12):46‒50. DOI:10.26438/ijcse/v7i12.4650</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Adida B. Helios: Web-based Open-Audit Voting // Proceedings of the 17th USENIX Security Symposium (USA, San Joce, 28 jule‒1 august 2008). 2008. PP. 335–348.</mixed-citation><mixed-citation xml:lang="en">Adida B. Helios: Web-based Open-Audit Voting. Proceedings of the 17th USENIX Security Symposium, 28 Jule‒1 August 2008, USA, San Joce. 2008. p.335–348.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Ben-Nun J., Fahri N., Llewellyn M., Riva B., Rosen A., Tashma A., Wikström D. A new implementation of a dual (paper and cryptographic) voting system // Proceedings of the 5th International Conference on Electronic Voting (EVOTE2012, Bregenz, Austria, 11‒14 July 2012). 2012. PP. 315‒329.</mixed-citation><mixed-citation xml:lang="en">Ben-Nun J., Fahri N., Llewellyn M., Riva B., Rosen A., Tashma A., Wikström D. A new implementation of a dual (paper and cryptographic) voting system. Proceedings of the 5th International Conference on Electronic Voting, EVOTE2012, 11‒14 July 2012, Bregenz, Austria. 2012. p.315‒329.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Hussien H., Aboelnaga H. Design of a secured e-voting system // International Conference on Computer Applications Technology (ICCAT, Tunisia, Sousse, 20‒22 January 2013). IEEE, 2013. DOI:10.1109/ICCAT.2013.6521985</mixed-citation><mixed-citation xml:lang="en">Hussien H., Aboelnaga H. Design of a secured e-voting system. International Conference on Computer Applications Technology, ICCAT, 20‒22 January 2013, Tunisia, Sousse. IEEE; 2013. DOI:10.1109/ICCAT.2013.6521985</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Sharma T. E-Voting using Homomorphic Encryption Scheme // International Journal of Computer Applications. 2016. Vol. 141. No. 13.</mixed-citation><mixed-citation xml:lang="en">Sharma T. E-Voting using Homomorphic Encryption Scheme. International Journal of Computer Applications. 2016;141(13).</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Huszti A. A homomorphic encryption-based secure electronic voting scheme // Publicationes Mathematicae. 2011. Vol. 79. PP. 479‒496.</mixed-citation><mixed-citation xml:lang="en">Huszti A. A homomorphic encryption-based secure electronic voting scheme. Publicationes Mathematicae. 2011;79:479‒496.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Varun M., Rahul S., Lawrence S., Kevin Zhu. Apollo. A secure, anonymized voting system using the Paillier cryptosystem // Project Report. 2016. PP. 1‒12.</mixed-citation><mixed-citation xml:lang="en">Varun M., Rahul S., Lawrence S., Kevin Zhu. Apollo. A secure, anonymized voting system using the Paillier cryptosystem. Project Report. 2016:1‒12.</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Ryan P.Y.A. Prêt à Voter with Paillier encryption // Mathematical and Computer Modelling. 2008. Vol. 48. Iss. 9-10. PP. 1646‒1662. DOI:10.1016/j.mcm.2008.05.015</mixed-citation><mixed-citation xml:lang="en">Ryan P.Y.A. Prêt à Voter with Paillier encryption. Mathematical and Computer Modelling. 2008;48(9-10):1646‒1662. DOI:10.1016/j.mcm.2008.05.015</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Htet N.O., Aye M. A. A Survey of Different Electronic Voting Systems // International Journal of Scientific Engineering and Technology Research. 2014. Vol. 3. PP. 3460‒3464.</mixed-citation><mixed-citation xml:lang="en">Htet N.O., Aye M. A. A Survey of Different Electronic Voting Systems. International Journal of Scientific Engineering and Technology Research. 2014;3:3460‒3464.</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Qadah G.Z, Taha R. Electronic voting systems: Requirements, design, and implementation // Computer Standards and Interfaces. 2007. Vol. 29. Iss. 3. PP. 376‒386. DOI:10.1016/j.csi.2006.06.001</mixed-citation><mixed-citation xml:lang="en">Qadah G.Z, Taha R. Electronic voting systems: Requirements, design, and implementation. Computer Standards and Interfaces. 2007;29(3):376‒386. DOI:10.1016/j.csi.2006.06.001</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Hao F., Ryan P.Y.A. Real-World Electronic Voting: Design, Analysis and Deployment. Boca Raton: Taylor &amp; Francis Group, 2016. 461 p.</mixed-citation><mixed-citation xml:lang="en">Hao F., Ryan P.Y.A. Real-World Electronic Voting: Design, Analysis and Deployment. Boca Raton: Taylor &amp; Francis Group; 2016. 461 p.</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Toapanta S.M.T, Chalén L.J.Ch., Rojas J.G.O., Gallegos L.E.M. A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture // IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS, China, Shenyang, 28‒30 July 2020). IEEE, 2020. PP. 206‒210. DOI:10.1109/ICPICS50287.2020.9202073</mixed-citation><mixed-citation xml:lang="en">Toapanta S.M.T, Chalén L.J.Ch., Rojas J.G.O., Gallegos L.E.M. A Homomorphic Encryption Approach in a Voting System in a Distributed Architecture. Proceedings of the International Conference on Power, Intelligent Computing and Systems, ICPICS, 28‒30 July 2020, China, Shenyang. IEEE; 2020. p.206‒210. DOI:10.1109/ICPICS50287.2020.9202073</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
