<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-4-114-121</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-503</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Способ защиты от атаки некорректного заполнения избирательного бюллетеня в системе дистанционного электронного голосования</article-title><trans-title-group xml:lang="en"><trans-title>Defense Method against an Attack of Incorrect Ballot Filling in a Remote Electronic Voting System</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0007-2861-9605</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Яковлев</surname><given-names>В. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Yakovlev</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, профессор кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">yakovlev.va@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4454-7844</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Салман</surname><given-names>В. Д.</given-names></name><name name-style="western" xml:lang="en"><surname>Salman</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">salman.vd@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>21</day><month>09</month><year>2023</year></pub-date><volume>9</volume><issue>4</issue><fpage>114</fpage><lpage>121</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Яковлев В.А., Салман В.Д., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Яковлев В.А., Салман В.Д.</copyright-holder><copyright-holder xml:lang="en">Yakovlev V., Salman V.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/503">https://tuzs.sut.ru/jour/article/view/503</self-uri><abstract><p>Анализируется система дистанционного электронного голосования, основанная на гомоморфном шифровании бюллетеня и применении блокчейн-технологий. Исследуются существующие способы защиты системы голосования от атаки, связанной с неправильным заполнением избирателем бюллетеня. Разработан способ защиты от атаки нарушения правила заполнения бюллетеня в целом, повышающий безопасность системы голосования, за счет обеспечения скрытности суммарного числа голосов, переданных избирателем в ходе проверки корректности заполнения бюллетеня.</p></abstract><trans-abstract xml:lang="en"><p>The remote electronic voting system based on homomorphic encryption and blockchain technologies is analyzed. The existing methods of protecting the voting system from an attack related to incorrect filling a ballot by the voter are studied. The method to protect against an attack of violation of the rules for filling a ballot as a whole is developed, which increases the security of voting system by ensuring secrecy of total number of votes given by voter during the verification correctness of filling a ballot.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>система дистанционного электронного голосования</kwd><kwd>проверка доказательства корректности заполнения бюллетеня</kwd><kwd>доказательство с нулевым разглашением секрета</kwd><kwd>схема Эль-Гамаля</kwd></kwd-group><kwd-group xml:lang="en"><kwd>remote electronic voting system</kwd><kwd>verification proof the correctness of filling the ballot</kwd><kwd>zero-knowledge proof system</kwd><kwd>El-Gamal scheme</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Adida B. Helios: Web-based open-audit voting // Proceedings of the 17th USENIX Security Symposium (San Jose, USA, 28–29 July 2008). 2008. PP. 335–348.</mixed-citation><mixed-citation xml:lang="en">Adida B. Helios: Web-based open-audit voting. Proceedings of the 17th USENIX Security Symposium, 28–29 July 2008, San Jose, USA. 2008. p.335–348.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Fujioka A., Okamoto T., Ohta K. A practical secret voting scheme for large scale elections // Proceedings of the Advances in Cryptology ‒ AUSCRYPT '92 (Gold Coast, Queensland, Australia, 13‒16 December 1992). Lecture Notes in Computer Science. Vol. 718. Berlin, Heidelberg: Springer, 1993. PP. 245–251. DOI:10.1007/3-540-57220-1_66</mixed-citation><mixed-citation xml:lang="en">Fujioka A., Okamoto T., Ohta K. A practical secret voting scheme for large scale elections. Proceedings of the Advances in Cryptology ‒ AUSCRYPT '92, 13‒16 December 1992, Gold Coast, Queensland, Australia. Lecture Notes in Computer Science, vol.718. Berlin, Heidelberg: Springer; 1993. p.245–251. DOI:10.1007/3-540-57220-1_66</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Killer C., Rodrigues B., Scheid E.J., Franco M., Eck M., Zaugg N. Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System // Proceedings of the 45th Conference on Local Computer Networks (LCN, Sydney, Australia, 16‒19 November 2020). IEEE, 2020. PP. 172–183. DOI:10.1109/LCN48667.2020.9314815</mixed-citation><mixed-citation xml:lang="en">Killer C., Rodrigues B., Scheid E.J., Franco M., Eck M., Zaugg N. Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System. Proceedings of the 45th Conference on Local Computer Networks, LCN, 16‒19 November 2020, Sydney, Australia. IEEE; 2020. p.172–183. DOI:10.1109/LCN48667.2020.9314815</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Suganya R., Sureshkumar A., Alaguvathana P., Priyadharshini S., Jeevanantham K. Blockchain Based Secure Voting System Using Iot // International Journal of Future Generation Communication and Networking. 2020. Vol. 13. Iss. 3. PP. 2134–2142.</mixed-citation><mixed-citation xml:lang="en">Suganya R., Sureshkumar A., Alaguvathana P., Priyadharshini S., Jeevanantham K. Blockchain Based Secure Voting System Using Iot. International Journal of Future Generation Communication and Networking. 2020;13(3):2134–2142.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Rasid N.H. Blockchain Technology in e-Voting: Comparative Study. 2020.</mixed-citation><mixed-citation xml:lang="en">Rasid N.H. Blockchain Technology in e-Voting: Comparative Study. 2020.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Ayed A.B. A Conceptual Secure Blockchain Based Electronic Voting System // International Journal of Network Security &amp; Its Applications. 2017. Vol. 9. Iss. 3. PP. 1–9. DOI:10.5121/ijnsa.2017.9301</mixed-citation><mixed-citation xml:lang="en">Ayed A.B. A Conceptual Secure Blockchain Based Electronic Voting System. International Journal of Network Security &amp; Its Applications. 2017;9(3):1–9. DOI:10.5121/ijnsa.2017.9301</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Программно-технический комплекс, обеспечивающий дистанционное электронное голосование избирателей (участников референдума) вне зависимости от места их нахождения. Описание ПТК ДЭГ. 2021. URL: https://evoting.digitaldem.ru/wp-content/uploads/sites/2/2021/07/ptkdeg_general_description_2021-07-15.pdf (дата обращения 07.09.2023)</mixed-citation><mixed-citation xml:lang="en">Software and Hardware Complex Providing Remote Electronic Voting of Voters (Referendum Participants) Regardless of Their Location. 2021. URL: https://evoting.digitaldem.ru/wp-content/uploads/sites/2/2021/07/ptkdeg_general_description_ 2021-07-15.pdf [Accessed 07.09.2023]</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">КриптоВече. Инструкция к системе Базовое описание информационной системы «КриптоВече».</mixed-citation><mixed-citation xml:lang="en">CryptoVeche. Instructions for the system Basic description of the information system "KriptoVeche".</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Dagher G.G., Marella P.B., Milojkovic M., Mohler J. BroncoVote: Secure Voting System Using Ethereum’s Blockchain // Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP, Funchal, Portugal, 22‒24 January 2018). Vol. 1. 2018. PP. 96–107. DOI:10.5220/0006609700960107</mixed-citation><mixed-citation xml:lang="en">Dagher G.G., Marella P.B., Milojkovic M., Mohler J. BroncoVote: Secure Voting System Using Ethereum’s Blockchain. Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP, 22‒24 January 2018, Funchal, Portugal. 2018. vol.1. p.96–107. DOI:10.5220/0006609700960107</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Yu B., Liu J., Sakzad A., Nepal S., Rimba P., Steinfeld R., Au M.H. Platform-Independent Secure Blockchain-Based Voting System // Cryptology ePrint Archive. 2018. URL: https://eprint.iacr.org/2018/657 (дата обращения 07.09.2023)</mixed-citation><mixed-citation xml:lang="en">Yu B., Liu J., Sakzad A., Nepal S., Rimba P., Steinfeld R., Au M.H. Platform-Independent Secure Blockchain-Based Voting System. Cryptology ePrint Archive. 2018. URL: https://eprint.iacr.org/2018/657 [Accessed 07.09.2023]</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Hsiao J.-H., Tso R., Chen C.-M., Wu M.-E. Decentralized E-Voting Systems Based on the Blockchain Technology // Proceedings of the International Conference on Computing Systems and Applications on Advances in Computer Science and Ubiquitous Computing (Taichung, Taiwan, 18‒20 December 2017). Lecture Notes in Electrical Engineering. Vol. 474. Singapore: Springer, 2018. PP. 305–309. DOI:10.1007/978-981-10-7605-3_50</mixed-citation><mixed-citation xml:lang="en">Hsiao J.-H., Tso R., Chen C.-M., Wu M.-E. Decentralized E-Voting Systems Based on the Blockchain Technology. Proceedings of the International Conference on Computing Systems and Applications on Advances in Computer Science and Ubiquitous Computing, 18‒20 December 2017, Taichung, Taiwan. Lecture Notes in Electrical Engineering, vol.474. Singapore: Springer; 2018. p.305–309. DOI:10.1007/978-981-10-7605-3_50</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Cramer R., Damgård I., Schoenmakers B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols // Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’94, Santa Barbara, USA, 21–25 August 1994). Lecture Notes in Computer Science. Vol. 839. Berlin, Heidelberg: Springer, 1994. PP. 174–187. DOI:10.1007/3-540-48658-5_19</mixed-citation><mixed-citation xml:lang="en">Cramer R., Damgård I., Schoenmakers B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’94, 21–25 August 1994, Santa Barbara, USA. Lecture Notes in Computer Science, vol.839. Berlin, Heidelberg: Springer; 1994. p.174–187. DOI:10.1007/3-540-48658-5_19</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Cramer R., Gennaro R., Schoenmakers B. A secure and optimally efficient multiauthority election scheme // European Transactions on Telecommunications. 1997. Vol. 8. Iss. 5. PP. 481–490. DOI:10.1002/ett.4460080506</mixed-citation><mixed-citation xml:lang="en">Cramer R., Gennaro R., Schoenmakers B. A secure and optimally efficient multiauthority election scheme. European Transactions on Telecommunications. 1997;8(5):481–490. DOI:10.1002/ett.4460080506</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Elgamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms // IEEE Transactions on Information Theory. 1985. Vol. 31. Iss. 4. PP. 469–472. DOI:10.1109/TIT.1985.1057074</mixed-citation><mixed-citation xml:lang="en">Elgamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 1985;31(4):469–472. DOI:10.1109/TIT.1985.1057074</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Chaum D., Pedersen T.P. Wallet Databases with Observers // Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO ’94, Santa Barbara, USA, 16–20 August 1992). Lecture Notes in Computer Science. Vol. 740. Berlin, Heidelberg: Springer, 1994. PP. 89–105. DOI:10.1007/3-540-48071-4_7</mixed-citation><mixed-citation xml:lang="en">Chaum D., Pedersen T.P. Wallet Databases with Observers. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’94, 16–20 August 1992, Santa Barbara, USA. Lecture Notes in Computer Science, vol.740. Berlin, Heidelberg: Springer; 1994. p.89–105. DOI:10.1007/3-540-48071-4_7</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Яковлев В.А., Салман В.Д. Методы защиты от угрозы неправильного заполнения избирательного бюллетеня в системе дистанционного электронного голосования // Труды учебных заведений связи. 2023. Т. 9. № 2. С. 128–142. DOI:10.31854/1813-324X-2023-9-2-128-142</mixed-citation><mixed-citation xml:lang="en">Yakovlev V., Salman V. Methods of Protection against Threat: Incorrect Ballot Filling by Voter in the Remote Electronic Voting System. Proc. of Telecom. Universities. 2023;9(2):128‒142. DOI:10.31854/1813-324X-2023-9-2-128-142</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Mohr A. A Survey of Zero-Knowledge Proofs with Applications to Cryptography. URL: http://austinmohr.com/Work_files/zkp.pdf (дата обращения 07.09.2023)</mixed-citation><mixed-citation xml:lang="en">Mohr A. A Survey of Zero-Knowledge Proofs with Applications to Cryptography. URL: http://austinmohr.com/ Work_ files/zkp.pdf [Accessed 07.09.2023]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
