Electronic voting protocols based on blind signature cryptographic scheme and biometric authentication

Authors

DOI:

https://doi.org/10.18372/2073-4751.77.18656

Keywords:

E-voting, cryptographic protocols, blind signature, biometric authentication

Abstract

The paper analyzes the requirements for the electronic voting procedure and identifies some problems that arise during the implementation of election schemes. Despite the large number of existing electronic voting schemes that use various cryptographic methods, there are still shortcomings and vulnerabilities that require special attention. One such problem is the prevention of vote selling. One of the most advanced voting methods, namely the He-Su protocol, was chosen as the basis, as it meets almost all the requirements for the electronic election process. The paper proposes to use cryptographic methods in combination with biometric authentication to partially solve the problem of vote selling. The proposed election algorithm is based on the He-Su protocol, which uses the homomorphism of the RSA cryptographic system and the blind signature procedure. Introducing the biometric authentication procedure into the algorithm reduces, in our opinion, the probability of votes being sold by unscrupulous voters, as it becomes difficult to do this without physical presence. Fingerprint biometrics with the use of a mobile application, and a biometric login authorized by the election organizer, appear to be the most convenient.

References

Schneier B. Applied Cryptography. Protocols, Algorithms, and Source Code in C. 2nd ed. New York : John Wiley & Sons, Inc., 1996. 784 p.

Brassard G., Crepeau C., Robert J.-M. All-or-Nothing Disclosure of Secrets. Lecture Notes in Computer Science. Vol. 263. Advances in Cryptology - CRYPTO '86. Proceedings / ed. by A. M. Odlyzko. Berlin, 1987. P. 234–238.

Heliosvoting project. URL: https://heliosvoting.org/.

Cortier V., Gaudry P., Glondu S. Features and usage of Belenios in 2022. Electronic Voting : proceedings of the 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, 4–7 October, 2022 / University of Tartu Press .Tartu, 2022. P. 53–56.

Chaum D. Blinding for unticipated signature. Lecture Notes in Computer Science. Vol. 304. Advances in Cryptology – EUROCRYPT '87. Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987. Proceedings / ed. by D. Chaum, W. L. Price. Berlin, 1988. P. 227–233.

Scantegrity. URL: http://www.scantegrity.org/

He Q., Su Z. A New Practical Secure e-Voting Scheme. IFIP/SEC’98 : proceedings of the 14th International Information Security Conference, Vienna/Budapest, Austria/Hungary, 31 August-4 September, 1998 / Austrian Computer Society. 1998. P.196–205.

Yang C.-H., Su P.-C., Su T.-C.. A novel electronic voting mechanism based on Blockchain technology. KSII Transactions on Internet and Information Systems. Vol. 17, no. 10. P. 2862–2882.

Fujioka A., Okamoto., Ohta K. A practical secret voting scheme for large scale elections. Lecture Notes in Computer Science. Vol. 718. Advances in Cryptology - AUSCRYPT '92. Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings / ed. by J. Seberry, Y. Zheng. Berlin, 1993. P. 244–251.

Cranor L., Cytron R. K. Sensus: A Security-Conscious Electronic Polling System for the Internet. 30th Hawaii International Conference on System Sciences (HICSS) : Volume 3: Information System Track-Organizational Systems and Technology, Maui, HI, USA, 3–6 January, 1997 / IEEE. Los Alamitos, 1997. P. 561–570.

Kakkad V., Patel M., Shah M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design. 2019. Vol. 2. P. 233–248.

Gardham D., Manulis M., Drăgan C. C. Biometric-authenticated searchable encryption. Lecture Notes in Computer Science. Vol. 12147. Applied Cryptography and Network Security. 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II / ed. by M. Conti et al. Cham, 2020. P. 40–61.

Pawade D. et al. Secure online voting system using biometric and blockchain. Advances in Intelligent Systems and Computing. Vol. 1042. Data Management, Analytics and Innovation. Proceedings of ICDMAI 2019, Volume 1 / ed. by N. Sharma, A. Chakrabarti, V. E. Balas. Singapore, 2020. P. 93–110.

Chang Y.-J., Zhang W., Chen T. Biometrics Based Cryptographic Key Generation. 2004 IEEE Conference on Multimedia and Expo : proceedings, Taipei, Taiwan, 27–30 June 2004 / IEEE, 2005. P. 2203–2206.

Published

2024-04-01

Issue

Section

Статті