Skip to main content
Erschienen in: Cluster Computing 1/2019

24.02.2018

Anonymous and formally verified dual signature based online e-voting protocol

verfasst von: Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif ur Rehman Malik, Naveed Ahmad, Atta ur Rehman Khan

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The traditional paper-based voting is severely criticized after having found evidence of rigging in elections, leading to the uncertainty in the fairness of the election process. Traditional voting systems have severe issues in either user’s privacy or voting procedures. To counter these issues, e-voting systems have emerged as a potential solution. In this work, we proposed Internet e-voting protocol that fulfills the core properties like anonymity, verifiability, eligibility, privacy, receipt-freeness and fairness using dual signature. We prove the effectiveness and validity of our system using formal methods. A rigorous performance evaluation shows that our system clearly outperforms the existing state-of-the-art blind signature Internet e-voting protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A., Roussopoulos, M.: D-DEMOS: a distributed, end-to-end verifiable, internet voting system. arXiv preprint arXiv:1507.06812 (2015) Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A., Roussopoulos, M.: D-DEMOS: a distributed, end-to-end verifiable, internet voting system. arXiv preprint arXiv:​1507.​06812 (2015)
2.
Zurück zum Zitat Rubin, A.: Security considerations for remote electronic voting. Commun. ACM 45(12), 39–44 (2002)CrossRef Rubin, A.: Security considerations for remote electronic voting. Commun. ACM 45(12), 39–44 (2002)CrossRef
3.
Zurück zum Zitat Buchsbaum, T.M.: E-voting: International Developments and Lessons Learnt. Electronic Voting in Europe Technology, Law, Politics and Society, pp. 31-34 (2004) Buchsbaum, T.M.: E-voting: International Developments and Lessons Learnt. Electronic Voting in Europe Technology, Law, Politics and Society, pp. 31-34 (2004)
4.
Zurück zum Zitat Krimmer, R., Triessnig, S., Volkamer, M.: The development of remote e-voting around the world: a review of roads and directions. In: International Conference on E-Voting and Identity, Springer Berlin Heidelberg, pp. 1–15 (2007) Krimmer, R., Triessnig, S., Volkamer, M.: The development of remote e-voting around the world: a review of roads and directions. In: International Conference on E-Voting and Identity, Springer Berlin Heidelberg, pp. 1–15 (2007)
5.
Zurück zum Zitat Okediran, O.O., Omidiora, E.O., Olabiyisi, S.O., Ganiyu, R.A., Alo, O.O.: A framework for a multifaceted electronic voting system. Int. J. Appl. Sci. 1(4), 135–142 (2011) Okediran, O.O., Omidiora, E.O., Olabiyisi, S.O., Ganiyu, R.A., Alo, O.O.: A framework for a multifaceted electronic voting system. Int. J. Appl. Sci. 1(4), 135–142 (2011)
6.
Zurück zum Zitat Cetinkaya, O., Doganaksoy, A.: A practical privacy preserving e-voting protocol using dynamic ballots. In: Proceedings of the 2nd National Cryptology Symposium, pp. 1–13 (2006) Cetinkaya, O., Doganaksoy, A.: A practical privacy preserving e-voting protocol using dynamic ballots. In: Proceedings of the 2nd National Cryptology Symposium, pp. 1–13 (2006)
7.
Zurück zum Zitat Olusola, O.O., Olusayo, O.E., Olatunde, O.S., Adesina, G.R.: A review of the underlying concepts of electronic voting. Inf. Knowl. Manag. 2(1), 8–20 (2012) Olusola, O.O., Olusayo, O.E., Olatunde, O.S., Adesina, G.R.: A review of the underlying concepts of electronic voting. Inf. Knowl. Manag. 2(1), 8–20 (2012)
8.
Zurück zum Zitat Alan, D.S., John, S.C.: Revolutionalising the voting process through online strategies. USA J Online Voting 29(5), 513–530 (2005) Alan, D.S., John, S.C.: Revolutionalising the voting process through online strategies. USA J Online Voting 29(5), 513–530 (2005)
9.
Zurück zum Zitat Weldemariam, K., Kemmerer, R.A., Villafiorita, A.: Formal analysis of an electronic voting system: an experience report. J. Syst. Softw. 84(10), 1618–1637 (2011)CrossRef Weldemariam, K., Kemmerer, R.A., Villafiorita, A.: Formal analysis of an electronic voting system: an experience report. J. Syst. Softw. 84(10), 1618–1637 (2011)CrossRef
10.
Zurück zum Zitat Oo, H.N., Aung, A.M.: Implementation and analysis of secure electronic voting system. Int. J. Sci. Technol. Res. 2, 158–161 (2013) Oo, H.N., Aung, A.M.: Implementation and analysis of secure electronic voting system. Int. J. Sci. Technol. Res. 2, 158–161 (2013)
11.
Zurück zum Zitat Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008) Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008)
12.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
13.
Zurück zum Zitat Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70 (2005) Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70 (2005)
14.
Zurück zum Zitat Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: International Workshop on the Theory and Application of Cryptographic Techniques, pp. 244–251. Springer, Berlin (1992) Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: International Workshop on the Theory and Application of Cryptographic Techniques, pp. 244–251. Springer, Berlin (1992)
15.
Zurück zum Zitat Baraani-Dastjerdi, A., Pieprzyk, J., Safani-Naini, R.: A Practical Electronic Voting Protocol Using Threshold Schemes. Department of Computing Science, University of Wollongong, Wollongong (1994) Baraani-Dastjerdi, A., Pieprzyk, J., Safani-Naini, R.: A Practical Electronic Voting Protocol Using Threshold Schemes. Department of Computing Science, University of Wollongong, Wollongong (1994)
16.
Zurück zum Zitat Juang, W.S., Chin-Laung, L.: A secure and practical electronic voting scheme for real world environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 64–71 (1997) Juang, W.S., Chin-Laung, L.: A secure and practical electronic voting scheme for real world environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 64–71 (1997)
17.
Zurück zum Zitat Juang, W.S., Lei, C.L., Liaw, H.T.: A verifiable multi-authority secret election allowing abstention from voting. Comput. J. 45(6), 672–682 (2002)MATHCrossRef Juang, W.S., Lei, C.L., Liaw, H.T.: A verifiable multi-authority secret election allowing abstention from voting. Comput. J. 45(6), 672–682 (2002)MATHCrossRef
18.
Zurück zum Zitat Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: International Workshop on Security Protocols, pp. 25–35. Springer, Berlin (1997) Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: International Workshop on Security Protocols, pp. 25–35. Springer, Berlin (1997)
19.
Zurück zum Zitat Kiayias, A., Yung, M.: The vector-ballot e-voting approach. In: International Conference on Financial Cryptography, pp. 72–89. Springer, Berlin (2004) Kiayias, A., Yung, M.: The vector-ballot e-voting approach. In: International Conference on Financial Cryptography, pp. 72–89. Springer, Berlin (2004)
20.
Zurück zum Zitat Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018). ISSN 0167-4048 Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018). ISSN 0167-4048
21.
Zurück zum Zitat Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74, 76–85 (2017)CrossRef Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74, 76–85 (2017)CrossRef
23.
Zurück zum Zitat Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. (IJCAC) 6(3), 32–44 (2016) Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. Int. J. Cloud Appl. Comput. (IJCAC) 6(3), 32–44 (2016)
24.
Zurück zum Zitat Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425–437 (2015)MathSciNetMATHCrossRef Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425–437 (2015)MathSciNetMATHCrossRef
25.
Zurück zum Zitat Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. (IJCAC) 7(1), 1–31 (2017) Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. (IJCAC) 7(1), 1–31 (2017)
26.
Zurück zum Zitat Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2015)CrossRef Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206–1216 (2015)CrossRef
27.
Zurück zum Zitat Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: big data toward green applications. IEEE Syst. J. 10(3), 888–900 (2016)CrossRef Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: big data toward green applications. IEEE Syst. J. 10(3), 888–900 (2016)CrossRef
28.
Zurück zum Zitat Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: greening big data. IEEE Syst. J. 10(3), 873–887 (2016)CrossRef Wu, J., Guo, S., Li, J., Zeng, D.: Big data meet green challenges: greening big data. IEEE Syst. J. 10(3), 873–887 (2016)CrossRef
29.
Zurück zum Zitat Wen, H., Tang, J., Wu, J., Song, H., Wu, T., Wu, B., Ho, P.-H., Lv, S.-C., Sun, L.-M.: A cross-layer secure communication model based on discrete fractional fourier fransform (DFRFT). IEEE Trans. Emerg. Top. in Comput. 3(1), 119–126 (2015)CrossRef Wen, H., Tang, J., Wu, J., Song, H., Wu, T., Wu, B., Ho, P.-H., Lv, S.-C., Sun, L.-M.: A cross-layer secure communication model based on discrete fractional fourier fransform (DFRFT). IEEE Trans. Emerg. Top. in Comput. 3(1), 119–126 (2015)CrossRef
30.
Zurück zum Zitat Malik, S.U.R., Khan, S.U., Srinivasan, S.K.: Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms. IEEE Trans. Cloud Comput. 1(1), 50–63 (2013)CrossRef Malik, S.U.R., Khan, S.U., Srinivasan, S.K.: Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms. IEEE Trans. Cloud Comput. 1(1), 50–63 (2013)CrossRef
31.
Zurück zum Zitat Malik, S.U.R., Khan, S.U.: Formal methods in large-scale computing systems. ITNow 55(2), 52–53 (2013)CrossRef Malik, S.U.R., Khan, S.U.: Formal methods in large-scale computing systems. ITNow 55(2), 52–53 (2013)CrossRef
32.
Zurück zum Zitat Malik, S.U.R., Bilal, K., Khan, S.U., Veeravalli, B., Li, K., Zomaya, A.Y.: Modeling and analysis of the thermal properties exhibited by cyber physical data centers. IEEE Syst. J. 11(1), 163–172 (Dec. 2015)CrossRef Malik, S.U.R., Bilal, K., Khan, S.U., Veeravalli, B., Li, K., Zomaya, A.Y.: Modeling and analysis of the thermal properties exhibited by cyber physical data centers. IEEE Syst. J. 11(1), 163–172 (Dec. 2015)CrossRef
34.
Zurück zum Zitat Nasir, M., Anjum, A., Manzoor, U., Balubaid, M.A., Ahmed, M., Khan, A., Ahmad, N., Malik, S.U.R., Alam, M.: Privacy preservation in skewed data using frequency distribution and weightage (FDW). J. Med. Imaging Health 7(06), 1346–1357 (2017)CrossRef Nasir, M., Anjum, A., Manzoor, U., Balubaid, M.A., Ahmed, M., Khan, A., Ahmad, N., Malik, S.U.R., Alam, M.: Privacy preservation in skewed data using frequency distribution and weightage (FDW). J. Med. Imaging Health 7(06), 1346–1357 (2017)CrossRef
35.
Zurück zum Zitat tul Muntaha, S., Khan, A., Manzoor, U., Sarwar, K., Ahmed, M., Tahir, M., Anjum, A., Malik, S.U.R., Alam, M., Javaid, N., Balubaid, M.A.: Towards preserving privacy of outsourced genomic data over the cloud. J. Med. Imaging Health 7(06), 1475–1482 (2017)CrossRef tul Muntaha, S., Khan, A., Manzoor, U., Sarwar, K., Ahmed, M., Tahir, M., Anjum, A., Malik, S.U.R., Alam, M., Javaid, N., Balubaid, M.A.: Towards preserving privacy of outsourced genomic data over the cloud. J. Med. Imaging Health 7(06), 1475–1482 (2017)CrossRef
36.
Zurück zum Zitat Moqurrab, S.A., Anjum, A., Manzoor, U., Nefti, S., Ahmad, N., Malik, S.U.R.: Differential average diversity: an efficient privacy mechanism for electronic health records. J. Med. Imaging Health 7(06), 1177–1187 (2017)CrossRef Moqurrab, S.A., Anjum, A., Manzoor, U., Nefti, S., Ahmad, N., Malik, S.U.R.: Differential average diversity: an efficient privacy mechanism for electronic health records. J. Med. Imaging Health 7(06), 1177–1187 (2017)CrossRef
37.
Zurück zum Zitat Anjum, A., Raschia, G., Khan, A., Malik, S.U.R., Ahmad, N., Ahmed, M., Suhail, S., Alam, M.: τ-Safety: a privacy model for sequential publication with arbitrary updates. Comput. Secur. 66, 20–39 (May 2017)CrossRef Anjum, A., Raschia, G., Khan, A., Malik, S.U.R., Ahmad, N., Ahmed, M., Suhail, S., Alam, M.: τ-Safety: a privacy model for sequential publication with arbitrary updates. Comput. Secur. 66, 20–39 (May 2017)CrossRef
38.
Zurück zum Zitat Zafar, F., Abid Khan, S.U.R., Malik, M.A., Adeel Anjum, M.I., Khan, N.J., Alam, M., Jamil, F.: A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput. Secur. 65, 29–49 (2017)CrossRef Zafar, F., Abid Khan, S.U.R., Malik, M.A., Adeel Anjum, M.I., Khan, N.J., Alam, M., Jamil, F.: A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput. Secur. 65, 29–49 (2017)CrossRef
39.
Zurück zum Zitat Asad, S., Saba, T., Hussain, S., Ahmed, M., Akram, S., Khan, A., Anjum, A., Shah, M.A., Javaid, N.: An ontology-based approach for detecting drug abuse epidemiology. J. Med. Imaging Health Inf. 7, 1324–1337 (2017)CrossRef Asad, S., Saba, T., Hussain, S., Ahmed, M., Akram, S., Khan, A., Anjum, A., Shah, M.A., Javaid, N.: An ontology-based approach for detecting drug abuse epidemiology. J. Med. Imaging Health Inf. 7, 1324–1337 (2017)CrossRef
40.
Zurück zum Zitat Zafar, F., Khan, A., Suhail, S., Ahmed, I., Khizar Hameed, H.M., Khan, F.J., Anjum, A.: Trustworthy data: a survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94, 50–68 (2017)CrossRef Zafar, F., Khan, A., Suhail, S., Ahmed, I., Khizar Hameed, H.M., Khan, F.J., Anjum, A.: Trustworthy data: a survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94, 50–68 (2017)CrossRef
41.
Zurück zum Zitat Anjum, A., Raschia, G.: BangA: an efficient and flexible generalization-based algorithm for privacy preserving data publication. Computers 6(1), 1 (2017)CrossRef Anjum, A., Raschia, G.: BangA: an efficient and flexible generalization-based algorithm for privacy preserving data publication. Computers 6(1), 1 (2017)CrossRef
42.
Zurück zum Zitat Jamil, F., Khan, A., Anjum, A., Ahmed, M., Jabeen, F., Javaid, N.: Secure provenance using an authenticated data structure approach. Comput. Secur. 73, 34–56 (2018)CrossRef Jamil, F., Khan, A., Anjum, A., Ahmed, M., Jabeen, F., Javaid, N.: Secure provenance using an authenticated data structure approach. Comput. Secur. 73, 34–56 (2018)CrossRef
43.
Zurück zum Zitat Adeel Anjum, S.U.R., Malik, K.-K.C., Khan, A., Haroon, A., Sangeen Khan, S.U., Khan, N.A., Raza, B.: An efficient privacy mechanism for electronic health records. Comput. Secur. 72, 196–211 (2018)CrossRef Adeel Anjum, S.U.R., Malik, K.-K.C., Khan, A., Haroon, A., Sangeen Khan, S.U., Khan, N.A., Raza, B.: An efficient privacy mechanism for electronic health records. Comput. Secur. 72, 196–211 (2018)CrossRef
Metadaten
Titel
Anonymous and formally verified dual signature based online e-voting protocol
verfasst von
Malik Najmus Saqib
Junaid Kiani
Basit Shahzad
Adeel Anjum
Saif ur Rehman Malik
Naveed Ahmad
Atta ur Rehman Khan
Publikationsdatum
24.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2162-7

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe

Premium Partner