A Novel Approach to E-Voting With Group Identity-Based Identification and Homomorphic Encryption Scheme

被引:0
|
作者
Vangujar, Apurva K. [1 ]
Ganesh, Buvana [1 ]
Umrani, Alia [1 ]
Palmieri, Paolo [1 ]
机构
[1] Univ Coll Cork, Sch Comp Sci & IT, Cork 21, Ireland
来源
IEEE ACCESS | 2024年 / 12卷
基金
爱尔兰科学基金会;
关键词
Electronic voting; Security; Privacy; Homomorphic encryption; Public key; Protocols; Standards; Identity-based identification; group identity-based identification; homomorphic encryption; e-voting; ElGamal; distributed ElGamal; discrete logarithmic assumption; SIGNATURE;
D O I
10.1109/ACCESS.2024.3408670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a novel e-voting scheme that combines Group Identity-based Identification (GIBI) with Homomorphic Encryption (HE) based on the discrete logarithmic assumption. The proposed scheme uses the Schnorr-like GIBI scheme for voter identification and authorization using zero-knowledge proofs to ensure the anonymity and eligibility of voters. The voter $\textsf {v}_{i,j}$ is granted the authorization to cast a valid vote for a single candidate $\textsf {C}_{k}$ . The use of distributed ElGamal provides fairness while the use of partial shares for decryption enables individual and universal verifiability without the need for a central authority. The proposed scheme is secure under various scenarios and robust in the random oracle model. The GIBI-HE scheme offers a promising solution for e-voting, providing a sustainable and accessible environment for voters while supporting the unreusability of votes and protecting the privacy of voters.
引用
收藏
页码:162825 / 162843
页数:19
相关论文
共 50 条
  • [21] Efficient identity-based fully homomorphic encryption over NTRU
    Duan R.
    Gu C.-X.
    Zhu Y.-F.
    Zheng Y.-H.
    Chen L.
    Tongxin Xuebao, 1 (66-75): : 66 - 75
  • [22] Efficient Proxy Re-encryption Scheme for E-Voting System
    Li, Wenchao
    Xiong, Hu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (05): : 1847 - 1870
  • [23] Identification of parts in identity-based encryption
    Stephanides, G
    Constantinescu, N
    INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 177 - 181
  • [24] RKA Security of Identity-Based Homomorphic Signature Scheme
    Chang, Jinyong
    Ma, Hui
    Zhang, Anling
    Xu, Maozhi
    Xue, Rui
    IEEE ACCESS, 2019, 7 : 50858 - 50868
  • [25] A homomorphic encryption-based secure electronic voting scheme
    Huszti, Andrea
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 479 - 496
  • [26] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [27] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732
  • [28] An Identity-Based Encryption Scheme with Compact Ciphertexts
    刘胜利
    郭宝安
    张庆胜
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 86 - 89
  • [29] Improvement of identity-based encryption scheme and algorithms
    Zheng, Ying
    Bai, Qing-Hai
    Zhao, Lin-Na
    Zhang, Hong-Mei
    Zhang, Yu-Chun
    DESIGN, MANUFACTURING AND MECHATRONICS (ICDMM 2015), 2016, : 482 - 489
  • [30] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856