An Improved Coercion-Resistant E-Voting Scheme

被引:0
|
作者
Hao, Yuanjing [1 ]
Zeng, Zhixin [1 ]
Chang, Liang [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
关键词
SYSTEM;
D O I
10.1155/2021/5448370
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
E-voting has gradually replaced the traditional voting methods to make it easier for people to conduct an election. Recently, Liu et al. propose an unconditional secure e-voting scheme using secret sharing and k-anonymity. Their scheme achieves correct tallying results without revealing raw voting information. However, in this paper, we observe that Liu et al.'s scheme cannot achieve coercion resistance in e-voting since the voter can prove the content of his ballot to the colluded candidates. Then, we propose an improved e-voting scheme to cover up the ballot of the voter with masked values. In this way, even if the voter colludes with corresponding candidates, he cannot prove which candidate he has voted for. Moreover, comparing with Liu et al.'s scheme, the security analysis shows that our proposed e-voting scheme achieves these security requirements like the coercion resistance, integrity of ballots, privacy of ballots, multiple-voting detection, and fairness. Through performance analysis, the experimental results show that our proposed e-voting scheme has higher time efficiency. Compared with other schemes, our scheme achieves a complete voting process and obtains the correct tallying result without complex computation and intricate communication process.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] A Hybrid E-Voting Scheme
    Peng, Kun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 195 - 206
  • [22] Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting
    Benaloh, Josh
    Moran, Tal
    Naish, Lee
    Ramchen, Kim
    Teague, Vanessa
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) : 685 - 698
  • [23] Toward coercion-resistant end-to-end verifiable electronic voting systems
    Santos, Wagner M.
    de Queiroz, Ruy J. G. B.
    Saraiva, Carlos E. R.
    Junior, Gleudson P. V.
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1696 - 1703
  • [24] Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
    Koenig, Reto
    Haenni, Rolf
    Fischli, Stephan
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 116 - 127
  • [25] Coercion-Resistant Electronic Elections
    Juels, Ari
    Catalano, Dario
    Jakobsson, Markus
    TOWARDS TRUSTWORTHY ELECTIONS: NEW DIRECTIONS IN ELECTRONIC VOTING, 2010, 6000 : 37 - +
  • [26] Secure Biometric E-Voting Scheme
    Ahmed, Taha Kh
    Aborizka, Mohamed
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 380 - 388
  • [27] An Improved Secure and Efficient E-Voting Scheme Based on Blockchain Systems
    Zhang, Jingyu
    Wu, Chenghao
    Simon Sherratt, R.
    Wang, Jin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 8626 - 8637
  • [28] E-voting scheme over the Internet
    Aborizka, Mohamed
    Shedeed, Ahmed
    Saad, Sherif
    Managing Information in the Digital Economy: Issues & Solutions, 2006, : 503 - 507
  • [29] An Anonymous and Efficient E-voting Scheme
    Ghavamipoor, Hoda
    Shahpasand, Maryam
    2013 7TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-SECURITY (ECDC), 2013,
  • [30] A Formal Approach to Coercion Resistance and Its Application to E-Voting
    Riou, Stanislas
    Kulyk, Oksana
    Marcos del Blanco, David Yeregui
    MATHEMATICS, 2022, 10 (05)