• DocumentCode
    2428601
  • Title

    Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines

  • Author

    Murshed, Manzur ; Sabrina, Tishna ; Iqbal, Azlan ; Ali, Mohamed

  • Author_Institution
    Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    798
  • Lastpage
    804
  • Abstract
    Designing a trustworthy voting system that uses electronic voting machines (EVMs) for efficiency and accuracy is a challenging task. It is difficult, if not impossible, to ensure the trustworthiness of EVMs that possess computation, storage, and communication capabilities. Thus an electronic voting system that does not assume trusted EVMs is clearly desirable. In this paper, we have proposed a k-anonymized electronic voting scheme that achieves this goal by assuming a hardware-controlled trusted random number generator external to the EVM. The proposed scheme relies on a k-anonymization technique to protect privacy and resort to joint de-anonymization of the votes for counting. Since the joint de-anonymization takes into account all the votes, it is difficult to manipulate an individual vote, even by the EVM, without being detected. Besides the anonymization technique, the proposed scheme relies on standard cryptographic hashing and the concept of floating receipt to provide end-to-end verifiability that prevents coercion or vote trading.
  • Keywords
    cryptography; data privacy; government data processing; random number generation; EVM; coercion prevention; communication capability; computation capability; electronic voting machines; end-to-end verifiability; floating receipt concept; hardware-controlled trusted random number generator; k-anonymization technique; k-anonymized electronic voting scheme; privacy preserving electronic voting; standard cryptographic hashing; storage capability; trustworthy voting system; untrusted machines; verifiable electronic voting; vote de-anonymization; vote trading; Casting; Cryptography; Electronic voting; Electronic voting systems; Joints; Nominations and elections; Privacy; coercion resistance; electronic voting; k-anonymity; privacy; verifiability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.97
  • Filename
    6680917