DocumentCode
2428601
Title
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines
Author
Murshed, Manzur ; Sabrina, Tishna ; Iqbal, Azlan ; Ali, Mohamed
Author_Institution
Gippsland Sch. of Inf. Technol., Monash Univ., Churchill, VIC, Australia
fYear
2013
fDate
16-18 July 2013
Firstpage
798
Lastpage
804
Abstract
Designing a trustworthy voting system that uses electronic voting machines (EVMs) for efficiency and accuracy is a challenging task. It is difficult, if not impossible, to ensure the trustworthiness of EVMs that possess computation, storage, and communication capabilities. Thus an electronic voting system that does not assume trusted EVMs is clearly desirable. In this paper, we have proposed a k-anonymized electronic voting scheme that achieves this goal by assuming a hardware-controlled trusted random number generator external to the EVM. The proposed scheme relies on a k-anonymization technique to protect privacy and resort to joint de-anonymization of the votes for counting. Since the joint de-anonymization takes into account all the votes, it is difficult to manipulate an individual vote, even by the EVM, without being detected. Besides the anonymization technique, the proposed scheme relies on standard cryptographic hashing and the concept of floating receipt to provide end-to-end verifiability that prevents coercion or vote trading.
Keywords
cryptography; data privacy; government data processing; random number generation; EVM; coercion prevention; communication capability; computation capability; electronic voting machines; end-to-end verifiability; floating receipt concept; hardware-controlled trusted random number generator; k-anonymization technique; k-anonymized electronic voting scheme; privacy preserving electronic voting; standard cryptographic hashing; storage capability; trustworthy voting system; untrusted machines; verifiable electronic voting; vote de-anonymization; vote trading; Casting; Cryptography; Electronic voting; Electronic voting systems; Joints; Nominations and elections; Privacy; coercion resistance; electronic voting; k-anonymity; privacy; verifiability;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.97
Filename
6680917
Link To Document