|Article title||PROTECTED ELECTRONIC VOTING SYSTEM WITH THE USE OF BLIND INTERMEDIARIES|
|Authors||L.K. Babenko, I.A. Pisarev, O.B. Makarevich|
|Section||SECTION I. INFORMATION TECHNOLOGIES AND PROTECTION OF INFORMATION|
|Month, Year||05, 2017 @en|
|Abstract||Our life is more and more connected with the Internet. Naturally, it concerns politics as well. In this regard, there are already many proposals and practical implementations for solving electronic voting problems. At the same time, ensuring the security of information in the system is an important issue in the conduct of elections. We propose to consider the possibility of voting using modern achievements of cryptography at all stages of the system functioning. The main technique used to create secure protocols between the servers of the system is the encryption of various keys of different parts of the information transmitted to different recipients. We called this protocol a protocol based on blind intermediaries. Basing on this protocol it is possible to built the system of electronic voting where all necessary requirements are taken into account, namely a possibility of participating in voting only for certain people and an impossibility to match the opened personal data of people with their vote. The system is characterized by the complex performance of all necessary functions for the protection of rights at all stages: preparation, registration, voting, counting of votes. The general scheme of voting is given. The basic techniques for providing system voting are described, namely: security of confidential data transmitted, distribution of secret keys, authentication of the parties, verification of the transmitted data for integrity, temporal control of the transmitted data. Algorithms implementing a clear sequence of actions at each stage have been developed on the basis of C # .Net Framework, consisting of a set of window applications interacting with each other across the network. The efficiency of the developed system is shown. Areas of improvement of the system are noted.|
|Keywords||Electronic voting; cryptographic protection; .Net; system.|
|References||1. Marcin Kucharczyk. Blind Signatures in Electronic Voting Systems, International Conference on Computer Networks, 2010.
2. Overview of e-voting systems, NICK Estonia. Estonian National Electoral Commission. Tallinn 2005.
3. Shubhangi S. Shinde, Sonali Shukla, D.K. Chitre. Secure E-voting Using Homomorphic Tech-nology, International Journal of Emerging Technology and Advanced Engineering, 2013.
4. Markus Jakobsson, Ari Juels, Ronald L. Rivest. Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking, 11th USENIX Security Symposium, 2002.
5. Ben Adida. Mixnets in Electronic Voting. Cambridge University, 2005.
6. Lifshits Yu. Elektronnye vybory [Electronic elections], 2005. Available at: http://yury.name/ crypto/03cryptonote.pdf.
7. Electronic elections: fear of falsification of the results. Kazakhstan today, 2004.
8. Lipen V.Y., Voronetsky M.A. Lipen DV technology and results of testing electronic voting systems. United Institute of Informatics Problems NASB, 2002.
9. Chaum David L. Untraceable electronic mail, return addresses, and digital pseudonyms, Com-munications of the ACM, 1981, Vol. 24 (2), pp. 84-90.
10. Ali S. T., Murray J. An Overview of End-to-End Verifiable Voting Systems, arXiv preprint arXiv: 1605.08554, 2016.
11. Smart M., Ritter E. True trustworthy elections: remote electronic voting using trusted computing, International Conference on Autonomic and Trusted Computing. Springer Berlin Heidelberg, 2011, pp. 187-202.
12. Bruck S., Jefferson D., Rivest R.L. A modular voting architecture ("frog voting"), Toward strustworthy elections. –pringer Berlin Heidelberg, 2010, pp. 97-106.
13. Jonker H., Mauw S., Pang J. Privacy and verifiability in voting systems: Methods, develop-ments and trends, Computer Science Review, 2013, Vol. 10, pp. 1-30.
14. Dossogne J., Lafitte F. Blinded additively homomorphic encryption schemes for self-tallying voting, Journal of Information Security and Applications, 2015, Vol. 22, pp. 40-53.
15. Neumann S., Volkamer M. Civitas and the real world: problems and solutions from a practical point of view, Availability, Reliability and Security (ARES), 2012 Seventh International Con-ference on. IEEE, 2012, pp. 180-185.
16. Yi X., Okamoto E. Practical remote end-to-end voting scheme, International Conference on Electronic Government and the Information Systems Perspective. Springer Berlin Heidelberg, 2011, pp. 386-400.
17. Hirt M., Sako K. Efficient receipt-free voting based on homomorphic encryption, International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 2000, pp. 539-556.
18. Rivest L. R. et al. Lecture notes 15: Voting, homomorphic encryption, 2002.
19. Sako K., Kilian J. Secure voting using partially compatible homomorphisms,Annual Interna-tional Cryptology Conference. Springer Berlin Heidelberg, 1994, pp. 411-424.
20. Izabachene M. A Homomorphic LWE Based E-voting Scheme, Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016.
21. Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine J. Alex Halderman. Security Analysis of the Estonian Internet Voting System, University of Michigan, Ann Arbor, MI, U.S.A. 2014.