A Taxonomy and Comparison of Remote Voting Schemes
|
|
|
- Victoria Williams
- 10 years ago
- Views:
Transcription
1 A Taxonomy and Comparison of Remote Voting Schemes Huian Li, Abhishek Reddy Kankanala, Xukai Zou Department of Computer and Information Science Purdue University Indianapolis, Indiana 46202, USA {huili, abhikank, Abstract Remote voting has been an active research field for application of cryptographic techniques in the last two decades with many schemes and systems in publication. In this paper we present an overview of recent efforts in developing voting schemes and security models that involve a variety of real world constraints to ensure election integrity. We classify voting schemes based on their primary cryptographic techniques. We analyze recent typical schemes and systems against the basic and counter attack requirements with brief description. Such analysis shows difference among these security requirements and aids in design of future schemes. Our conclusion is provided regarding suitability of a particular voting system/scheme under various conditions. Keywords Remote voting, Cryptography, Privacy, Electronic voting scheme, Protocol I. INTRODUCTION Voting is the fundamental human right to voice opinion in democratic systems. From paper ballots and punch cards in early days, to current Direct-Recording Electronic (DRE) systems, the voting method has experienced tremendous transitions. With the advancement of cryptographic techniques and the new revolution in computing hardware, particularly, the portable electronic devices such as laptops, tablets, and smartphones, the voting techniques are embracing for an opportunity of dramatic improvement. Many remote voting schemes and systems have been proposed in recent years to replace paper based voting for many obvious reasons such as efficiency and convenience. For example, remote voting allows people living in different places outside the country such as soldiers and diplomats to participate in elections easily by voting online. As pointed out in [16], the assumption of physical booths, hardware and software at polling places, and trusted human supervision in voting schemes, contradicts society s trend toward enabling interactions from anywhere at anytime. In this paper, we investigate typical existing schemes and systems in literature, categorize them based on cryptographic techniques, and analyze unique techniques embedded in each of them. Our goal is to give a big picture of state-of-the-art voting methods and to enlighten us on the design of future voting schemes and systems. Our paper is organized as follows. Section II presents common pieces in remote voting schemes, including entities, stages, and requirements. Section III lists typical remote voting assumptions and building blocks. Section IV describes categories of voting schemes based on primary cryptographic techniques. Section V gives the analysis of schemes with a comparison at the end. Section VI summarizes the paper. II. ENTITIES, STAGES, AND REQUIREMENTS In this section, we first provide an overview of typical entities and stages involved in a voting scheme. Then we give a list of voting requirements. A. Typical Remote Voting Entities Here we enumerate all entities that will be involved in the entire e-voting process. A typical e-voting scheme includes the following entities. Voter. Voter is a person who will choose among the contesting candidates and cast vote. By using an authentication system, all schemes should be able to tell an eligible voter from ineligible ones. In schemes that considering voter coercion, a coercer could pretend to be a voter. Candidate. Candidate is a person contesting in the elections. There are different positions to which a candidate may contest. The list of all the contestants or candidates will be shown to a voter and the voter has to decide for which candidate he has to vote. Authority. Authority is an entity responsible for conducting the elections. The authority has to follow all the guidelines and implement the protocols for voting. Typically, a voting system will have multiple authorities. Registrar. Registrar in a voting scheme is responsible for authenticating voters. Usually a set of registrars is assumed. They jointly issue keying materials such as private keys and public keys to voters. Auditor. Auditor will audit the voting process by inspecting individual votes, final voting results, or voting logs. Adversary. Apart from the entities above, there can be a malicious entity in the voting model called adversary which will attempt to manipulate the voting process and results. There are two types of adversary, external and internal. The external adversary will actively try to coerce a voter or breach the privacy of voters and an internal adversary, apart from breaching the privacy, may also try to corrupt the authority from inside. Adversary can also be classified into passive and active. The passive adversary honestly follow the protocol but try to infer more information, while the active adversary aims to violate the protocol in various ways. Bulletin Board. This is the place publicly accessible to all entities listed above, usually with the appendive-write capability. It can be a public web site even allowing outsiders to access (but not write functionality). In certain schemes, it is a piece of universally accessible memory [31], [25]. However, not all schemes assume the existence of all entities mentioned above. For example, auditor is omitted from many schemes. In some schemes, authority may also carry the duty of registrar. B. Generic Remote Voting Stages In general, a voting scheme has several stages [59], [11] according to the voting model, and entities participate in different stages to follow cryptographic protocols and achieve requirements. The generic stages are given below. Initialization. The authority or voting center prepares for the remote voting by following an initialization protocol. For example, in the RSA based scheme [14], the authority /14/$ IEEE
2 generates two large prime numbers as public and private keys for the rest of the voting process. Registration/Authentication. Every voter has to register and be authenticated before casting vote. For example, the identification of a voter is checked using a browser based cryptographic protocol or by an . Vote Casting. The voter casts his vote using the exclusive credentials or keys given by the authority. Vote Tallying. The authorities tally all the votes and publish the voting result. Typically votes are anonymous and sometimes encrypted. Vote Verification. The voter should be provided with a verification procedure such that he can finally verify which candidate he has voted for. Auditing. Auditing is done by the authority after finishing the voting procedure. The vote count is determined and will be sent to a central authority. The above are generic stages followed by most of remote voting schemes. There might be schemes that will have some additional or less stages. C. Major E-voting Requirements In order for an e-voting scheme to be useful in practice, it should satisfy several requirements [55], [38], [21], [47], [56]. We enumerate the basic requirements first, and then give a list of requirements for countering attacks. 1) Basic Requirements: We argue that the requirements listed below are fundamental for every voting scheme. Correctness. If all the participants are honest and following the protocol, the voting results reflect all voters will. Privacy. Privacy implies that voter s information should remain secret. This is actually one of voting regulations in certain countries. If a voter s information is published along with his vote, this certainly violates privacy. Verifiability. A voter can verify his vote without revealing the identity and knows that his vote is counted (which is called individual verifiability). Anyone can verify the final voting results (which is called universal verifiability). Eligibility. Only eligible voters are allowed to vote. This is usually implemented through authentication. Reliability. The system should work without compromising votes, even if certain system failure occurs. Transparency. Voters should be able to understand the system generally. If a voting scheme allows a voter to participate every stages from initial setup to final tally and verification, voters will be able to witness the whole process. Certainly this provides transparency, thus achieving voter assurance. In other words, voters will be assured that his vote is correctly cast and counted through transparency. Fairness. Information about votes cannot be learned until the voting results are published. Any participants (even outsiders) cannot gain knowledge of the voting result before its final publication, thus precluding preannouncement of any partial voting results. 2) Counter Attack Requirements: It is important for a voting scheme to have certain counter attack requirements. Such features enhance the security of the model. A vulnerable voting scheme may be attacked by adversaries who will try to manipulate the election and lead to incorrect results. A secure voting scheme should possess the following requirements. Fig. 1: Requirements of e-voting schemes Robustness. Robustness of a scheme guarantees resistance against active and passive attacks, and any errors in the voting process. There might be several entities trying to disrupt the voting process, so a robust scheme must provide the required security and allow voters to complete voting without any interruption. Incoercibility. In order to manipulate the voting results, an adversary may use multiple methods to coerce voters. For example, he can demand a voter to refrain from voting; or he can represent as a valid voter if he gets this voter s private key. So an incoercible voting scheme should defend against such adversary to coerce voters. Receipt Freeness. A voter should not be provided with a receipt which may be used to trace the vote by other entity. In particular, a receipt may be used as a proof to show the vote is cast as being requested for vote buying and selling, and also for voter coercion. Multiple-voting Detection. Multiple voting by a single voter will be identified. In a voting system allowing multiple votes, There are two approaches in literature [25], [31] to address this issue. One approach is that the last vote counts. In another approach, if all multiple votes by one voter devote to the same candidate, only one is counted. However, if these votes go to different candidates, all votes by this voter are cancelled. These counting approaches are usually used to defend voter coercion. Software Independence. Software independence requires that an undetected change or error cannot cause an undetectable change or error in an election outcome [46]. This usually requires thorough evaluation and examination of the voting scheme. Fig. 1 shows two levels of requirements of a voting scheme in which the first level are fundamental, while the second level includes counter attack and advanced requirements, and the requirements in higher level is more difficult to implement. In general, all the requirements are equally important for remote elections. However, depending on the voting situation and certain specific needs, some requirements may outweigh others. As pointed out in [25], there is not single voting scheme satisfying all requirements. From a different perspective, several design principles for secure remote voting are listed in [53] including proven security, trustworthy design responsibility, published source code, vote verification, voter accessibility, ensuring anonymization, and expert oversight. Most of them correspond to the requirements mentioned above. III. ASSUMPTIONS AND BUILDING BLOCKS In this section, we first give some common cryptographic assumptions. A few common building blocks are presented afterwards. 667
3 A. Common Assumptions Untappable Channel. Several remote voting schemes, especially early ones, assume an untappable channel between communication parties, typically, voters and authorities (or registrars). It provides information-theoretic secrecy, but is not practical in reality. Certain scheme even makes stronger and unrealistic assumption such as an anonymous untappable channel. Anonymous Channel. Anonymous channel is relaxed from untappable channel in terms of security, by allowing adversaries to spy on the communication channel and to intercept data. This is more realistic assumption about the distribution of credentials by registrars or authorities. Voting Booth. Many remote voting schemes assume the existence of voting booth. The voting booths are governed by authorities, some even with guard. Usually only one voter is allowed to enter booth at a time and communication channels are provided between voting authorities and a booth so a voter can cast his vote. Typically no receipt is printed after a vote is casted. (In case a voter does receive a receipt, he will be asked to destroy it before leaving the booth.) The assumption provides receipt freeness. However, having physical booths is not a practical assumption for remote voting. B. Common Building Blocks Deniable Encryption. Deniable encryption is used against revealing encrypted information such that the owner of this information can decrypt it in an alternative way to different plaintext. It was introduced in [10], [9] that allows a sender to encrypt a bit b in such a way that the resulting ciphertext can be explained as either b or 1 b to a coercer. Depending on which party being coerced, deniable encryption is classified into sender-deniable scheme (resilient against coercing, i.e., demanding to see the sender s ciphertext), receiver-deniable scheme, and sender-and-receiverdeniable scheme. Based on keys used between a sender and a receiver, it is also classified into public key deniable encryption and shared key deniable encryption. A sender-deniable public key encryption based on RSA was proposed in [47], and a receiver-deniable encryption scheme based on ElGamal was introduced in [34]. Zero-knowledge Proof. Zero-knowledge proof (ZKP) is also frequently used in various stages of a voting scheme between senders and receivers for verification purposes. It is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any additional information apart from the fact that the statement is indeed true. For cases where the ability to prove the statement requires some secret information on the part of the prover, the definition implies that the verifier will not be able to prove the statement to anyone else. It has two forms, non-interactive ZKP and interactive ZKP. The first form is used primarily in voting schemes. Secure Multi-party Computation. Secure multi-party computation is adopted into e-voting schemes to allow participants to carry computation jointly without anyone disclosing his data to others. Yao [58] has shown that any multi-party computation can be performed using a garbled circuit representation, but it is hard to implement efficiently. Here we give secure two-party multiplication by Samet and Miri [49]. Initially, each of parties, M i (i = 1,2), holds a private input x i. At the end of the protocol, M i will have 668 a private output r i, such that x 1 x 2 = r 1 + r 2. The protocol works as follows: 1) M 1 chooses a private key d and a public key e for an additively homomorphic public-key encryption scheme, with encryption and decryption functions being E and D, respectively. 2) M 1 sends E(x 1,e) to M 2. 3) M 2 selects a random number r 2, computes E(x 1,e) x 2E(r 2,e) 1, and sends the result back to M 1. 4) M 1 decrypts the received value into D(E(x 1,e) x 2E(r 2,e) 1,d) and takes it as r 1. Plaintext Equivalence Test. Plaintext equivalence test [30] is usually used to check if two encrypted votes are identical. Given two ciphertexts {v 1 } r 1 k and {v 2 } r 2 k respectively, with each encrypted using the same key k, a plaintext equivalence test allows the holders of the decryption key to demonstrate that plaintexts v 1 and v 2 are equal without revealing the decryption key or any information about v 1 and v 2. There are other building blocks such as randomizer and commitment schemes. We omit the discussion due to space constraints. IV. PRIMARY CRYPTOGRAPHIC TECHNIQUES AND CORRESPONDING SCHEMES Here we present four primary cryptography techniques including mixnets, blind signature, threshold homomorphic encryption, and secret sharing, together with their corresponding e-voting schemes. A. Mixnets Based Schemes Mixnets is introduced by David Chaum [12] as a technique to provide anonymous communication, and later is applied into many voting schemes [3], [31], [36]. It is based on public key cryptography to provide anonymity and untraceability. Mixnets is multiparty communication protocol which takes input messages, shuffles them in a random order such that all the parties know that shuffling is performed and no party knows about shuffling algorithm. In today s network, a sender and a receiver no longer remain confidential because every packet transmitted consists of IP addresses of the sender and the receiver. Any one can look through the packets to gain knowledge of the sender and the receiver. By using anonymous channels we can hide the information of sender so that even the receiver cannot relate back to the sender. In mixnets, such an anonymous communication is implemented by a set of nodes which take messages as inputs and bounce them back in a shuffled order [45]. When a sender wants to send a message, he passes it on to a node. Then the node permutes and passes the message to the next node, the last node sends the message to the receiver. As long as one node is honest and functions correctly, the anonymity of the sender can be guaranteed. Mixnets can be implemented in two categories: 1) Decryption Mixnets: In this type of mixnets, the nodes have a pair of public and private keys. A public key infrastructure is used to distribute the keys [3], [45]. Let pub i be the public key and priv i the private key for the i-th node, and r i be a random padding. The encryption protocol works as follows if a voter sends a message v through five nodes: v enc = E pub1 (r 1,E pub2 (r 2,E pub3 (r 3,E pub4 (r 4,E pub5 (r 5,v))))) Here the message will be encrypted in layers, the encrypted messages will pass through the nodes in the correct order, the nodes will decrypt the message and the last node delivers the message v. The decryption protocol works similarly by using the private keys.
4 2) Re-encryption Mixnets: Re-encryption mixnets also consists of multiple nodes to randomize and pass the messages. In this process, instead of decrypting the message from previous node, each node re-encrypts the message and passes on to the next node. Therefore if one node is honest we can guarantee that message is anonymous. The re-encryption mixnets can be deployed using different cryptosystems. One example is the ElGamal cryptosystem [3], [45]. B. Blind Signature Based Schemes Blind signature [13] is applied in several e-voting schemes [39], [33], [44]. It is fundamentally one kind of digital signature where the content of a message is blinded before it is signed. In another word, it allows a person to get a third party to sign a message without revealing the content of a message, thus achieving confidentiality of the voter s ballot. Usually an authority blindly signs a voter s vote to authenticate it. Hence the authority whose function is to verify the eligibility of a voter will not know whom the voter votes for. Currently blind key signature schemes are present with many public key protocols. One of such schemes is blind RSA scheme in which a traditional RSA signature is used. Here is a simple scheme of blind signature based on RSA signing [24]. Let (N,e) be the authority s public key and (N,d) be his private key where d is the inverse of e mod φ(n). A voter chooses a random number r such that gcd(r,n) = 1, and sends the following to the authority: v = v r e mod N The random number r is used to hide the ballot v from the authority. The authority then signs the blinded ballot after verification and sends back S. S = (v ) d = v d (r e ) d = v d r mod N After receiving S, the voter unblinds it to get the true signature S since he knows r. S = S r 1 = v d r r 1 = v d mod N Anonymous channels can be used to provide maximum privacy. A voter will get a blind signed vote, and then submit vote to the mixnets. After all the polls are completed, the mixnets will process the encrypted votes. The authority decrypts the votes shuffled by mixnets and displays the result to public. This approach is efficient but lacks transparency. C. Threshold Homomorphic Encryption Based Schemes Homomorphic encryption is used extensively among e- voting schemes [27], [6], [47]. It was first proposed by Benaloh et al. [5], [7]. It refers to a scenario in which the encryption of combined secret can be reconstructed from multiple independently encrypted secrets. Let the operations and be defined on the plaintext space and the ciphertext space, respectively. The product of the encryptions of two votes v 1 and v 2 is the encryption of the sum of two votes v 1 and v 2. More specifically, E(v 1 v 2 ) = E(v 1 ) E(v 2 ). Examples of partially homomorphic cryptosystems [57] include ElGamal, Paillier, RSA, and a few others. Below we give further detail of ElGamal and Paillier cryptosystems. 1) ElGamal: The ElGamal cryptosystem [20] is adopted often in e-voting schemes. It is by nature homomorphic with multiplication. Assume in a commutative group G of order G = q, the public key is (G,q,g,h) where g is a generator of G, h = g x, and x being the secret key. The encryption of a vote v is E(v) = (α,β) = (g r,v h r ) for some random r {0,1,...,q 1}. For two votes which are encrypted as E(v 1 ) = (α 1,β 1 ) = (g r 1,v 1 h r 1), and E(v 2 ) = (α 2,β 2 ) = (g r 2,v 2 h r 2) The homomorphic property is then: E(v 1 ) E(v 2 ) = (α 1,β 1 ) (α 2,β 2 ) = (g r 1,v 1 h r 1) (g r 2,v 2 h r 2) = (g r 1+r 2,(v 1 v 2 )h r 1+r 2 ) = E(v 1 v 2 ) The encrypted votes are summed by using the homomorphic property of the encryption function (without decrypting them). However, ElGamal is only multiplicative homomorphic as shown above, so e-voting systems taking advantage of ElGamal usually adopt a slightly modified cryptosystem which is additive homomorphic. The modified ElGamal works as below. The encryption of a vote v is E(v) = (α,β) = (g r, p v h r ) where p is another independent (from g) generator of G. For two votes which are encrypted as E(v 1 ) = (α 1,β 1 ) = (g r 1, p v 1 h r 1), and E(v 2 ) = (α 2,β 2 ) = (g r 2, p v 2 h r 2) So the additive homomorphic property is: E(v 1 ) E(v 2 ) = (α 1,β 1 ) (α 2,β 2 ) = (g r 1, p v 1 h r 1) (g r 2, p v 2 h r 2) = (g r 1+r 2, p v 1+v 2 h r 1+r 2 ) = E(v 1 + v 2 ) 2) Paillier: The Paillier cryptosystem [40] is another probabilistic encryption function for public key cryptography. The notable feature is its homomorphic property. In this cryptosystem, assume the public key is the modulus m and the base is g, the encryption of a vote v is E(x) = g x r m mod m 2 for some random r {0,1,...,m 1}. For two votes which are encrypted as E(v 1 ) = g v 1r1 m, and E(v 2 ) = g v 2r2 m The homomorphic property is then: E(v 1 ) E(v 2 ) = (g v 1r m 1 )(gv 2r m 2 ) = g v 1+v 2 (r 1 r 2 ) m = E(v1 + v2 mod m) In many voting schemes, all votes can be added by using homomorphic encryption without decrypting them first, therefore ensuring privacy. So homomorphic encryption is an efficient method for e-voting schemes but it cannot be applied to schemes in which addition is not performed as a main method for combination. D. Secret Sharing Based Schemes Secret sharing is also used in many e-voting schemes due to its efficiency and simplicity. In Shamir s scheme [19], a secret s in a finite field is partitioned into n shares where any k-sized subset of these n shares reveals s (k n), but any subset of size smaller than k reveals nothing about s. A secret sharing scheme can have the property of homomorphism. As an example, simplified (n, n) secret sharing [60] 669
5 TABLE I: Typical cryptographic primitives in e-voting and their comparison Typical Crypto-primitives Advantages Disadvantages Mixnets Shuffling makes votes unlinkable to voters; Multiple encryptions are needed for input; No fixed sequence of stages is required [50], [22] Large size messages are not efficiently accommodated [50], [22] Blind signature Efficient and simple to implement Signer has no control over attributes except for those bound by public key; Universal verifiability is hard to implement Homomorphic encryption Tallying procedure is simple; Susceptible to some attacks such as RSA blinding attack; Votes cannot be tallied before being cast Concern over zero knowledge proof used in voting schemes Secret sharing Increased reliability and confidentiality; Robust but harder to implement; Low security demand of communication channel Concern over scalability is additively homomorphic. Here, the secret s is partitioned into n shares s i (1 i n) such that s = n i=1 s i. The sum of two shares s i and s i (corresponding to s and s respectively) is a share of the sum of the two secrets s and s. Several voting schemes [37], [18], [28] exploit homomorphism based on secret sharing. Some schemes [18] utilize Shamir s threshold secret sharing, while some [28] are based on Chinese remainder theorem. Table I summarizes the four major cryptographic techniques used in e-voting systems. Currently, most schemes utilize mixnets and homomorphic encryption. V. ANALYSIS OF EXISTING SCHEMES In this section, we give analysis of several remote voting schemes. For each scheme, a short description is provided, together with main properties. A. UVote Category: Mixnets Description: In this scheme [1], voters are required for preregistration and have the ability to vote multiple times. Only the last vote is counted and higher priority will be given to the vote casted from a voting center because the voter is personally present to verify his details, which makes the system coercion resistant. Vote selling is not possible because a voter can later change his vote by casting from another device. Voters initially register their mobile numbers or addresses as primary account, and can add multiple accounts later. The primary account is used for coercion resistance. Any notifications and messages are sent to the primary account for verification and it cannot be deleted online. Voters get their public and private key pairs for encryption and decryption of votes. A unique PIN is provided to access electoral website. Properties: Verifiability is achieved through providing confirmation messages and notices. Universal verifiability is ensured by the back end system. No partial result or individual vote is revealed until the end of election, thus achieving fairness. Receipt freeness is not achieved as a receipt is provided to the voter. B. Zeus Caterogy: Mixnets Description: Voters in the web based Zeus system [54] need to visit the web site to register public and private keys. The browser verifies a key by comparing the hash value with the registered one. This scheme uses the same cryptographic techniques as Helios [4]. Mixing is done by the Zeus system and external agents. Trustees are notified for decryption after the mixing process is finished. The Zeus system combines the decryptions and produces results. The results may be presented using external algorithms. Properties: The results are posted onto bulletin board for universal verification. Receipt freeness in not achieved as a cryptographically signed receipt is provided to the voter at the end. 670 C. Cobra Category: Homomorphic encryption Description: In this Scheme [23], voters have to register by creating and submitting an encrypted credential. This credential is homomorphically added to an encrypted Bloom Filter[43], [29]. A voter selects certain number of candidate passwords and registers one of them. Then the voter encrypts the vote and uses his password to regenerate credential. A coercer is not able to manipulate a voter s vote because he may give the coercer a fake password or panic password [15]. Ballots are submitted using anonymous channels. Tallying is performed by the authority. The ballots are homomorphically added and decrypted, and results are published. Properties: The final tally is verifiable. This scheme is coercion resistant as it uses a fake credential feature. D. Helios Category: Mixnets, homomorphic encryption Description: Helios is a web based voting scheme [4]. It runs as a client program in browser, so voters can use their browsers to submit votes. Helios protocol is similar to Benaloh s simple verifiable voting protocol [35]. mixnets is the tool to anonymize ballots. Properties: A voter can verify that his ballot is received correctly. It also provides universal verifiability. Anyone can independently and externally verify that all votes were valid without any credentials. It is meant for low coercion elections. E. Secure Internet Voting Using DSA Public Keys Category: Mixnets Description: This scheme [26] depends on anonymity provided by shuffling Digital Signature Algorithm (DSA) public keys. The voting credentials consist of simple DSA public keys. The shuffling of these keys leads to a list of anonymous keys, which can no longer be attributed to individual voters, but can still be used to verify their signatures. Properties: This system offers universal verifiability. Receipt freeness is also achieved. However, coercion resistance is questionable. F. Civitas Category: Mixnets Description: Civitas [16] utilizes a publicly viewable log service such as a bulletin board, and integrity is maintained by using digital signatures. Protocol compliance is enforced through several instances of ZKP. In order to resist coercion, a voter has to use his designated private key and run an algorithm to generate fake credentials. The voter provides these fake credentials in case of coercion from adversaries. All the votes submitted through fake credentials are eliminated, and the revoting depends on the policy specified by the supervisor. An enhanced scheme [52] introduces robustness into Civitas. Properties: Tabulation is publicly verifiable. Additional verifiability is ensured through log records. Coercion resistance is achieved by giving away fake credentials.
6 G. Multi-Authority E-voting System Category: Homomorphic encryption Description: This scheme [2] consists of multiple authorities, i.e., the election is controlled by multiple administrators to ensure privacy and overcome colluding in case of single administrator. This scheme uses homomorphic encryption. A voter s ballot is digitally signed with ElGamal DSA and encrypted with the additive ElGamal scheme. Properties: Several security properties, such as fairness and completeness, are guaranteed. Privacy is achieved using encryption. ZKP is used through out the process. Voters are allowed to vote only once. However, this property can be used by adversaries to vote on their behalf. A voter has no option of giving away a fake vote in order to defend against coercion. H. E-NOTE Description: Two levels of security measure are used in this E-NOTE scheme [42] to prevent leakage of privacy or collusion of authorities. E-NOTE is an enhanced version of NOTE (Name and vote separated E-voting scheme) [41] which separates names and votes on ballots so that privacy concerns during vote counting can be eliminated. All voting transactions are recorded in order to prevent fraud. A voter has to register through an election authority first and get a certificate. The voter uses this certificate to obtain ballot from a ballot distribution center. This method ensures confidentiality as there is no linkage between voter s true identity and his certificate. the electronic ballot consists of three parts. It is sent to the vote counting committee (VCC), but VCC can decrypt only one part which contains the voting data. Tallying is done without matching the voter s name with his vote. This ensures the privacy and can also protect him from adversaries as they do not know which person has voted for which candidate. Properties: Each voter obtains a watchdog device from the election commission to achieve confidentiality. Coercion resistance property is not given importance in this scheme. A voter is given a receipt to review and track his vote, so receipt freeness is not achieved. I. Bingo Voting Description: This scheme [8] provides an efficient way to achieve verifiability and coercion resistance based on a trusted random number generator. A bulletin board is used for recording and public verifiability. Every ballot has a unique serial number and each voter can take a copy with them after voting. Every voter will be given a receipt for all the candidates, even those he did not vote for. All serial numbers are printed on the same receipt. Dummy votes are generated for every candidate and are shuffled before election. These fake or dummy votes are also published in the bulletin board so a voter can use them to avoid vote selling pressure from adversary. The tallying takes place by only counting the real votes. Dummy votes can be distinguished as those random numbers are taken from a pool which was created before. Here the voter is assured that the original vote is tallied. A cryptographic proof is submitted and can be checked after tallying. In the final stage only, the original votes are counted and results are displayed. Properties: Voter has ability to check his vote, achieving verifiability. This scheme ensures privacy and correctness. Coercion resistance is effectively implemented. Receipt freeness is also achieved since the given receipt cannot prove to others which candidate the voter has voted for. J. VoteBox Description: The VoteBox system [51] utilizes a distributed broadcast network and replicated log, providing robustness and auditability in case of failure, misconfiguration, or tampering. The system utilizes an immediate ballot challenge to assure a voter that his ballot is cast as intended. Additionally, the vote decryption key can be distributed to several mutuallyuntrusted parties. VoteBox provides strong auditing functionality. Properties: The scheme is receipt free and allows voter to verify his vote. It assumes the existence of voting booth, so coercion resistance and privacy are achieved since an adversary cannot enter the booth with the voter. K. Prêt à Voter Category: Mixnets Description: The Prêt à Voter scheme [48] encodes a voter s vote using a randomized candidate list. The randomization ensures the secrecy of the voter s vote. After a voter casts vote in a voting booth, he is given a receipt such that the voter can verify his receipt appears on the bulletin board. The receipt in an encrypted form can be used to reconstruct the candidate order and consequently the vote he has cast. In reality, the secret keys of the encryption are shared across several tellers. All votes are published on a bulletin board for verification by voters. The tellers will take all submitted receipts, apply mix networks, and then decrypt them to tally votes. Properties: This scheme provides end-to-end verifiability and receipt freeness. With the assumption of voting booth, it achieves privacy and coercion resistance. L. ADDER Category: Homomorphic encryption Description: Adder [32] is an open source Internet based voting system. A public key is set up for the voting system, and a private key is shared by a set of authorities. Each voter encrypts his vote using the public key. The encrypted vote and its ZKP are published onto the bulletin board. Due to the homomorphic property, the encrypted tally is obtained by multiplying all encrypted votes on the bulletin board. The authorities then work together to obtain the decrypted tally. The trust is split among authorities. Properties: This scheme provides universal verifiability. Depending on the voting setup (such as Internet or polling places), it may allow verification by an individual voter. Each procedure is supervised by multiple authorities, and the final tally cannot be revealed without the cooperation of a given number of authorities, so the trust is distributed. M. Scytl Remote Voting System Category: Secret sharing, Mixnet Description: Scytl [17] is an Internet-based voting system currently in operation. Basically, it exploits secret sharing to distribute a voter s private key to many servers (and destroy the key after distribution). It assumes components such as voting kiosk located in polling place and SSL connection over VPN between polling centers and election centers. Mixing protocols are followed after voting. Scytl copies all collected data to appropriate backup media and delivers the data to authorities for future auditing. Properties: This scheme has several assumptions. Vote verification is provided. Scytl s coercion resistance is based on its architecture. 671
7 TABLE II: Comparison of voting schemes based on the requirements Schemes/ Individual Universal Fair- Coercion- Robust- Receipt Cryptographic Tailored Systems Verifiability Verifiability ness resistance ness freeness primitives Hardware UVote [1] Y NK NK Y NK N Mixnets N Zeus [54] Y Y Y N Y N Mixnets, ZKP N Cobra [23] N N Y Y Y Y HE, EBF N Helios [4] Y Y Y N Y N Mixnets, ZKP N DSA Public Keys [26] Y Y Y Y Y NK HE, Mixnets, ZPK N RSA Puzzle Lock [14] Y NK Y NK Y NK RSA N Civitas [16] Y NK Y Y Y Y Mixnets N Multi-Authority [2] NK Y Y Y Y Y HE, ElGamal DSA N E-NOTE [42] Y Y Y NK Y N RSA Watchdog Bingo [8] Y Y Y Y Y Y CM, ZKP Booth VoteBox [51] Y Y NK Y Y Y HE, HC Booth Prêt à Voter [48] Y Y Y Y Y Y Mixnets Booth ADDER System [32] NK Y Y Y Y Y HE, ZKP N Scytl [17] Y Y Y Y Y Y SS, Mixnets Booth, VM Y: Yes; N: No; NK: Not Known; HE: Homomorphic Encryption; EBF: Encrypted Bloom Filter; ZKP: Zero Knowledge Proof; CM: Commitment; HC: Hash Chaining; SS: Secret Sharing; VM: Verification Module; Booth: Voting Booth Table II gives a comprehensive view of the requirements satisfied by the schemes mentioned above, together with their corresponding cryptographic techniques and necessary hardware. We have to point out that All schemes claim to achieve privacy, eligibility, and correctness, so we leave out these columns in the table. We omit software independence from the table simply because it is not clearly indicated in each scheme, and hard to evaluate. For a given requirement, some schemes may claim success in their implementations, but the degree of success varies. Take robustness as an example, a few schemes assume that one voter can vote once only. With this assumption, it certainly excludes some vulnerabilities, while others can handle this particular case. The definition of requirements in each scheme/system is also not identical. For example, in Uvote [1], an SMS message is considered as individual verification. Several schemes claimed coercion resistance. However, their implementations are quite different. Some of them take advantage of fake/panic passwords, while others assume the voting booth because the coercer cannot enter it together with the voter. VI. CONCLUSION In this paper, we present a comprehensive review of the recent research work on the remote voting schemes and systems. We discuss the voting requirements and cryptographic building blocks, and categorize the schemes based on cryptographic techniques. We also study in-depth the security properties of each scheme. Our observations are as follows. 1) There is not a scheme or system satisfying all requirements. 2) Currently, coercion resistance relies on the fake/panic credential or polling places. However, the assumption of a polling place is not suitable and realistic for remote voting. 3) Transparency is not implemented in most of schemes. Even though some schemes claims to be transparent, it is still vague to voters. We argue transparency is important in a voting scheme for giving assurance to voters. In return, it can win voter s confidence in the voting process. 4) The involvement of special device can potentially be a burden to voters, since one primary goal of remote voting is to provide convenience to voters. With our analysis, we hope to shed some light on the directions of future remote voting design. 672 REFERENCES [1] R. Abdelkader and M. Youssef. Uvote: A ubiquitous e-voting system. In Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on, pages 72 77, [2] A. P. Adewole, A. S. Sodiya, and O. A. Arowolo. A receipt-free multiauthority e-voting system. Int. Jour. of Comp. App., 30(6):15 23, Sep [3] B. Adida. Advances in Cryptographic Voting Systems. PhD thesis, Cambridge, MA, USA, AAI [4] B. Adida. Helios: Web-based open-audit voting. In Proceedings of the 17th Conference on Security Symposium, SS 08, pages , [5] J. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract). In Advances in Cryptology - CRYPTO 86, Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [6] J. Benaloh. Verifiable Secret Ballot Elections. PhD thesis, Yale University, [7] J. Benaloh and M. Yung. Distributing the power of a government to enhance the privacy of voters. In Proceedings of the fifth annual ACM symposium on Principles of distributed computing, PODC 86, pages 52 62, New York, NY, USA, ACM. [8] J. Bohli, J. Müller-Quade, and S. Röhrich. Bingo voting: Secure and coercion-free voting using a trusted random number generator. In Proceedings of the 1st International Conference on E-voting and Identity, VOTE-ID 07, pages , [9] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. In Burton Kaliski, editor, Advances in Cryptology CRYPTO 97, volume 1294 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [10] R. Canetti and R. Gennaro. Incoercible multiparty computation. In Proceedings of the 37th Annual Symposium on Foundations of Computer Science, FOCS 96, pages 504, Washington, DC, USA, IEEE Computer Society. [11] O. Cetinkaya and A. Doganaksoy. A practical verifiable e-voting protocol for large scale elections over a network. In Availability, Reliability and Security, ARES The Second International Conference on, pages , [12] D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84 90, February [13] D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology: Proceedings of CRYPTO 82, pages Plenum, [14] H. Chen and R. Deviani. A secure e-voting system based on rsa time-lock puzzle mechanism. In The 7th International Conference on BWCCA, pages , [15] J. Clark and U. Hengartner. Panic passwords: Authenticating under duress. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC 08, pages 8:1 8:6, [16] M. Clarkson, S. Chong, and A. Myers. Civitas: Toward a secure voting system. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages , [17] M. Clarkson, B. Hay, M. Inge, D. Wagner, and A. Yasinsac. Software review and security analysis of scytl remote voting software, September 2008.
8 [18] R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Proc. of the 16th annual Int. Conf. on Theory and App. of cryptographic techniques, EURO- CRYPT 97, pages , [19] E. Dawson and D. Donovan. The breadth of shamir s secret-sharing scheme. Comput. Secur., 13(1):69 78, February [20] T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In George Blakley and David Chaum, editors, Advances in Cryptology, volume 196 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [21] J. Epstein. Electronic voting. IEEE Computer, 40(8):92 95, [22] J. Esch. Prolog to a survey on mix networks and their secure applications. Proceedings of the IEEE, 94(12): , [23] A. Essex, J. Clark, and U. Hengartner. Cobra: toward concurrent ballot authorization for internet voting. In Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 12, pages 3 3, Berkeley, CA, USA, USENIX Association. [24] S. Goldwasser and M. Bellare. Lecture notes on cryptography. Summer course Cryptography and computer security at MIT, [25] G. S. Grewal, M. D. Ryan, S. Bursuc, and P. Y. Ryan. Caveat coercitor: coercion-evidence in electronic voting. In IEEE Security and Privacy Symposium, [26] R. Haenni and O Spycher. Secure internet voting on limited devices with anonymized dsa public keys. In Proceedings of the 2011 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 11, [27] M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In Proc. of the 19th Int. Conf. on Theory and App. of cryptographic techniques, pages , [28] S. Iftene. General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci., 186, July [29] W. Itani, C. Ghali, A. El Hajj, A. Kayssi, and A. Chehab. Sinpack: A security protocol for preventing pollution attacks in network-coded content distribution networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pages 1 6, [30] M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In Tatsuaki Okamoto, editor, Advances in Cryptology ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [31] A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant electronic elections. In Proceedings of ACM workshop on Privacy in the electronic society, WPES 05, pages 61 70, New York, NY, USA, [32] A. Kiayias, M. Korman, and D. Walluck. An internet voting system supporting user privacy. In Proceedings of the 22Nd Annual Computer Security Applications Conference, ACSAC 06, pages , Washington, DC, USA, IEEE Computer Society. [33] K. Kim, J. Kim, B. Lee, and G. Ahn. Experimental design of worldwide internet voting system using pki. In Proc. of SSGRR Int. Conf. on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, SSGRR2001, [34] M. Klonowski, P. Kubiak, and M. Kutyłowski. Practical deniable encryption. In Viliam Geffert, Juhani Karhumäki, Alberto Bertoni, Bart Preneel, Pavol Návrat, and Mária Bieliková, editors, SOFSEM 2008: Theory and Practice of Computer Science, volume 4910 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [35] R. Kusters and T. Truderung. An epistemic approach to coercionresistance for electronic voting protocols. In Security and Privacy, th IEEE Symposium on, pages , [36] B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Providing receipt-freeness in mixnet-based voting protocols. In In Proc. of Information Security and Cryptology (ICISC03), volume 2971 of LNCS, pages Springer, [37] B. Lee and K. Kim. Receipt-free electronic voting through collaboration of voter and honest verifier. In Proc. of JW-ISC2000, pages , [38] C. Li and M. Hwang. Security enhancement of chang-lee anonymous e-voting scheme. International Journal of Smart Home, 6(2):45 52, April [39] M. Ohkubo, F. Miura, M. Abe, A. Fujioka, and T. Okamoto. An improvement on a practical secret voting scheme. In Proceedings of the Second International Workshop on Information Security, ISW 99, pages , London, UK, UK, Springer-Verlag. [40] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern, editor, Advances in Cryptology EUROCRYPT 99, volume 1592 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, / X 16. [41] H. Pan, E., Hou, and N. Ansari. Ensuring voters and candidates confidentiality in e-voting systems. In 34th IEEE Sarnoff Symposium, May [42] H. Pan, E. Hou, and N. Ansari. E-note: An e-voting system that ensures voter confidentiality and voting accuracy. In IEEE International Conference on Communications (ICC), pages , June [43] H. Perl, Y. Mohammed, M. Brenner, and M. Smith. Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography. In E-Science (e-science), 2012 IEEE 8th International Conference on, pages 1 8, [44] M. Radwin. An untraceable, universally verifiable voting scheme. Seminar in Cryptology, [45] P. Ribarski and L. Antovski. Mixnets: Implementation and performance evaluation of decryption and re-encryption types. In Information Technology Interfaces (ITI), Proceedings of the ITI th International Conference on, pages , [46] R. L. Rivest. On the notion of software independence in voting systems. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366(1881): , [47] Z. Rjaskova. Electronic Voting Schemes. PhD thesis, Comenius University, [48] P. Y. A. Ryan, D. Bismark, J. Heather, S. Schneider, and Z. Xia. Prêt à voter: a voter-verifiable voting system. Information Forensics and Security, IEEE Transactions on, 4(4): , Dec [49] S. Samet and A. Miri. Privacy preserving ID3 using Gini index over horizontally partitioned data. In Proc. of the 2008 IEEE/ACS, AICCSA 08, pages , Washington, DC, USA, [50] K. Sampigethaya and R. Poovendran. A survey on mix networks and their secure applications. Proceedings of the IEEE, 94(12): , [51] D. Sandler, K. Derr, and D. S. Wallach. Votebox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th Conference on Security Symposium, SS 08, pages , [52] F. Shirazi, S. Neumann, I. Ciolacu, and M. Volkamer. Robust electronic voting: Introducing robustness in civitas. In Requirements Engineering for Electronic Voting Systems (REVOTE), 2011 International Workshop on, pages 47 55, [53] CACM Staff. Seven principles for secure e-voting. Commun. ACM, 52(2):8 9, February [54] G. Tsoukalas, K. Papadimitriou, and P. Louridas. From helios to zeus. In Greek Research and Education Network; Panayiotis Tsanakas, National Technical University of Athens, 2013 Usenix EVT conference, pages 1 10, [55] M. Volkamer and R. Grimm. Determine the resilience of evaluated internet voting systems. In Requirements Engineering for e-voting Systems (RE-VOTE), 2009 First International Workshop on, pages 47 54, aug [56] T. Wan and W. Liao. Cryptanalysis on polynomial-based e-voting schemes. In 2010 International Conference on E-Business and E- Government (ICEE), pages , [57] Wikipedia. Homomorphic encryption, [Online; accessed 21- October-2012]. [58] A. C. Yao. How to generate and exchange secrets. In Foundations of Computer Science, 1986., 27th Annual Symposium on, pages , Oct [59] S. Yun and S. Lee. The network based electronic voting scheme suitable for large scale election. In The 6th International Conference on Advanced Communication Technology, volume 1, pages , [60] X. Zhao, L. Li, G. Xue, and G. Silva. Efficient anonymous message submission. In INFOCOM, pages ,
A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)
A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) Zhe Xia University of Surrey [email protected] Steve Schneider University of Surrey [email protected] May 25, 2006 Abstract
Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S.
72 Int. J. Electronic Governance, Vol. 3, No. 1, 2010 Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol Vahid Jahandideh and Amir S. Mortazavi Department
On Coercion-Resistant Electronic Elections
On Coercion-Resistant Electronic Elections with Linear Work Stefan G. Weber, Roberto Araújo, Johannes Buchmann Darmstadt University of Technology Department of Computer Science Hochschulstrasse 10, 64289
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract) Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey [email protected] Abstract Electronic voting
An electronic scheme for the Farnel paper-based voting protocol
An electronic scheme for the Farnel paper-based voting protocol R. Araújo 1, R. Custódio 2, A. Wiesmaier 1, and. akagi 3 1 echnische Universität Darmstadt, Germany 2 George Washington University, USA 3
Secure Electronic Voting
7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University
Electronic Voting Protocol Analysis with the Inductive Method
Electronic Voting Protocol Analysis with the Inductive Method Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification
Verification and Validation Issues in Electronic Voting
Verification and Validation Issues in Electronic Voting Orhan Cetinkaya 1, and Deniz Cetinkaya 2 1 Institute of Applied Mathematics, METU, Ankara, Turkey 2 Computer Engineering, METU, Ankara, Turkey [email protected]
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Deniable Encryption Key
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 4 (May. - Jun. 2013), PP 08-12 Deniable Encryption Key P.Lokesh Kumar Reddy1 1, B.Rama Bhupal Reddy
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Butin 1 / 37 2 / 37 Introduction Network communication sensitive: banking, private correspondence,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Efficient Receipt-Free Voting Based on Homomorphic Encryption
Efficient Receipt-Free Voting Based on Homomorphic Encryption Martin Hirt 1 and Kazue Sako 2 1 ETH Zurich, Switzerland [email protected] 2 NEC Corporation, Japan [email protected] Abstract. Voting schemes
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
The Design of Web Based Secure Internet Voting System for Corporate Election
The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Le vote électronique : un défi pour la vérification formelle
Le vote électronique : un défi pour la vérification formelle Steve Kremer Loria, Inria Nancy 1 / 17 Electronic voting Elections are a security-sensitive process which is the cornerstone of modern democracy
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Group Blind Digital Signatures: Theory and Applications by Zulækar Amin Ramzan Submitted to the Department of Electrical Engineering and Computer Science in partial fulællment of the requirements for the
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper
Ballot Casting Assurance
Ballot Casting Assurance Ben Adida MIT C. Andrew Neff VoteHere Abstract We propose that voting protocols be judged in part on ballot casting assurance, a property which complements universal verifiability.
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
Real World Experiences with Bingo Voting and a Comparison of Usability
Real World Experiences with Bingo Voting and a Comparison of Usability Michael Bär 1, Christian Henrich 1, Jörn Müller-Quade 1, Stefan Röhrich 2 and Carmen Stüber 1 1 Institut für Algorithmen und Kognitive
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
