Defense Method against an Attack of Incorrect Ballot Filling in a Remote Electronic Voting System
https://doi.org/10.31854/1813-324X-2023-9-4-114-121
Abstract
The remote electronic voting system based on homomorphic encryption and blockchain technologies is analyzed. The existing methods of protecting the voting system from an attack related to incorrect filling a ballot by the voter are studied. The method to protect against an attack of violation of the rules for filling a ballot as a whole is developed, which increases the security of voting system by ensuring secrecy of total number of votes given by voter during the verification correctness of filling a ballot.
About the Authors
V. YakovlevRussian Federation
V. Salman
Russian Federation
References
1. Adida B. Helios: Web-based open-audit voting. Proceedings of the 17th USENIX Security Symposium, 28–29 July 2008, San Jose, USA. 2008. p.335–348.
2. Fujioka A., Okamoto T., Ohta K. A practical secret voting scheme for large scale elections. Proceedings of the Advances in Cryptology ‒ AUSCRYPT '92, 13‒16 December 1992, Gold Coast, Queensland, Australia. Lecture Notes in Computer Science, vol.718. Berlin, Heidelberg: Springer; 1993. p.245–251. DOI:10.1007/3-540-57220-1_66
3. Killer C., Rodrigues B., Scheid E.J., Franco M., Eck M., Zaugg N. Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System. Proceedings of the 45th Conference on Local Computer Networks, LCN, 16‒19 November 2020, Sydney, Australia. IEEE; 2020. p.172–183. DOI:10.1109/LCN48667.2020.9314815
4. Suganya R., Sureshkumar A., Alaguvathana P., Priyadharshini S., Jeevanantham K. Blockchain Based Secure Voting System Using Iot. International Journal of Future Generation Communication and Networking. 2020;13(3):2134–2142.
5. Rasid N.H. Blockchain Technology in e-Voting: Comparative Study. 2020.
6. Ayed A.B. A Conceptual Secure Blockchain Based Electronic Voting System. International Journal of Network Security & Its Applications. 2017;9(3):1–9. DOI:10.5121/ijnsa.2017.9301
7. Software and Hardware Complex Providing Remote Electronic Voting of Voters (Referendum Participants) Regardless of Their Location. 2021. URL: https://evoting.digitaldem.ru/wp-content/uploads/sites/2/2021/07/ptkdeg_general_description_ 2021-07-15.pdf [Accessed 07.09.2023]
8. CryptoVeche. Instructions for the system Basic description of the information system "KriptoVeche".
9. Dagher G.G., Marella P.B., Milojkovic M., Mohler J. BroncoVote: Secure Voting System Using Ethereum’s Blockchain. Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP, 22‒24 January 2018, Funchal, Portugal. 2018. vol.1. p.96–107. DOI:10.5220/0006609700960107
10. Yu B., Liu J., Sakzad A., Nepal S., Rimba P., Steinfeld R., Au M.H. Platform-Independent Secure Blockchain-Based Voting System. Cryptology ePrint Archive. 2018. URL: https://eprint.iacr.org/2018/657 [Accessed 07.09.2023]
11. Hsiao J.-H., Tso R., Chen C.-M., Wu M.-E. Decentralized E-Voting Systems Based on the Blockchain Technology. Proceedings of the International Conference on Computing Systems and Applications on Advances in Computer Science and Ubiquitous Computing, 18‒20 December 2017, Taichung, Taiwan. Lecture Notes in Electrical Engineering, vol.474. Singapore: Springer; 2018. p.305–309. DOI:10.1007/978-981-10-7605-3_50
12. Cramer R., Damgård I., Schoenmakers B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’94, 21–25 August 1994, Santa Barbara, USA. Lecture Notes in Computer Science, vol.839. Berlin, Heidelberg: Springer; 1994. p.174–187. DOI:10.1007/3-540-48658-5_19
13. Cramer R., Gennaro R., Schoenmakers B. A secure and optimally efficient multiauthority election scheme. European Transactions on Telecommunications. 1997;8(5):481–490. DOI:10.1002/ett.4460080506
14. Elgamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 1985;31(4):469–472. DOI:10.1109/TIT.1985.1057074
15. Chaum D., Pedersen T.P. Wallet Databases with Observers. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’94, 16–20 August 1992, Santa Barbara, USA. Lecture Notes in Computer Science, vol.740. Berlin, Heidelberg: Springer; 1994. p.89–105. DOI:10.1007/3-540-48071-4_7
16. Yakovlev V., Salman V. Methods of Protection against Threat: Incorrect Ballot Filling by Voter in the Remote Electronic Voting System. Proc. of Telecom. Universities. 2023;9(2):128‒142. DOI:10.31854/1813-324X-2023-9-2-128-142
17. Mohr A. A Survey of Zero-Knowledge Proofs with Applications to Cryptography. URL: http://austinmohr.com/ Work_ files/zkp.pdf [Accessed 07.09.2023]
Review
For citations:
Yakovlev V., Salman V. Defense Method against an Attack of Incorrect Ballot Filling in a Remote Electronic Voting System. Proceedings of Telecommunication Universities. 2023;9(4):114-121. (In Russ.) https://doi.org/10.31854/1813-324X-2023-9-4-114-121