|Article title||ELECTRONIC VOTING USING MULTIPLE CAST BALLOTS|
|Authors||L. K. Babenko, I. A. Pisarev|
|Section||SECTION I. METHODS, MODELS AND ALGORITHMS OF INFORMATION PROCESSING|
|Month, Year||05, 2018 @en|
|Abstract||The use of electronic voting is gradually replacing the traditional one. However, the issue of creating an honest and reliable electronic voting system is still open. Creating a reliable e-voting system that meets all security requirements is a difficult task. The paper presents an electronic voting system based on the principle of blind mediators using multiple ballots. Blind mediators allow you to exclude the user"s voice from communicating with any of its authentication data. The principle of multiple ballot casting is based on the use of fraudulent bulletins and allows verifying the correctness of the ballot paper without the use of evidence with zero disclosure, as well as ensuring compliance with the requirements for electronic voting systems. The architecture of the system is described, the components involved in the voting process, and their interaction with each other are described. The voting process is described, consisting of several stages: preparation, voting, counting of results. Cryptographic protocols are used, which are used for data transfer between system components. The principles of filling out the ballots are described, depending on the number of candidates and the type of voting. Types of voting are described as one of many and several of many. The compliance with the security requirements of the system is justified. The procedure for fraudulent voting is described, which is used to protect the real voice of the voter in case of possible compulsion to a certain candidate"s choice. It describes the main attacks that can be carried out with the help of malicious software on the client application, the mechanisms of protection against this or that attack are justified, as well as further ways of finalizing the system to counter attacks.|
|Keywords||Electronic voting; cryptographic security; cryptographic protocols; encryption.|
|References||1. Delaune S., Kremer S., & Ryan, M. Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, 2009, Vol. 17 (4), pp. 435-487.
2. Dossogne J., Lafitte F. Blinded additively homomorphic encryption schemes for self-tallying voting, Journal of Information Security and Applications, 2015.
3. David L Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 1981, 24 (2): 84-90.
4. Izabachene M. A Homomorphic LWE Based E-voting Scheme, P ost-Quantum Cryptography: 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016.
5. Hirt M., Sako K. Efficient receipt-free voting based on homomorphic encryption, International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 2000, pp. 539-556.
6. Rivest L. R. et al. Lecture notes 15: Voting, homomorphic encryption, 2002.
7. Ben Adida. Mixnets in Electronic Voting, Cambridge University, 2005.
8. Electronic elections: fear of falsification of the results. Kazakhstan today, 2004.
9. Lipen V.Y., Voronetsky M.A., Lipen D.V. technology and results of testing electronic voting systems. United Institute of Informatics Problems NASB, 2002.
10. Ali S. T., Murray J. An Overview of End-to-End Verifiable Voting Systems, arXiv preprint arXiv: 1605.08554, 2016.
11. Smart M., Ritter E. True trustworthy elections: remote electronic voting using trusted computing, International Conference on Autonomic and Trusted Computing. Springer Berlin Heidelberg, 2011, pp. 187-202.
12. Bruck S., Jefferson D., Rivest R.L. A modular voting architecture ("frog voting"), Toward strustworthy elections. Springer Berlin Heidelberg, 2010.
13. Jonker H., Mauw S., Pang J. Privacy and verifiability in voting systems: Methods, developments and trends // Computer Science Review, 2013.
14. Shubhangi S. Shinde, Sonali Shukla, Prof. Chitre D.K. Secure E-voting Using Homomorphic Technology, International Journal of Emerging Technology and Advanced Engineering, 2013.
15. Neumann S., Volkamer M. Civitas and the real world: problems and solutions from a practical point of view, Availability, Reliability and Security (ARES), 2012 Seventh International Conference on. IEEE, 2012, pp. 180-185.
16. Yi X., Okamoto E. Practical remote end-to-end voting scheme, International Conference on Electronic Government and the Information Systems Perspective. Springer Berlin Heidelberg, 2011, pp. 386-400.
17. Babenko L., Pisarev I., Makarevich O. A model of a secure electronic voting system based on blind intermediaries using Russian cryptographic algorithms, In Proceedings of the 10th International Conference on Security of Information and Networks (SIN '17). ACM, New York, NY, USA, 2017, pp. 45-50.
18. Rivest R.L., Smith W.D. Three voting protocols: ThreeBallot, VAV, and Twin, USENIX/ACCURATE Electronic Voting Technology (EVT 2007), 2007.
19. Santin A.O., Costa R.G., Maziero C.A. A three-ballot-based secure electronic voting system, IEEE Security & Privacy, 2008, Vol. 6, No. 3, pp. 14-21.
20. Henry K.J., Stinson D.R., Sui J. The effectiveness of receipt-based attacks on threeballot, IEEE Transactions on Information Forensics and Security, 2009, Vol. 4, No. 4, pp. 699.