DOI QR코드

DOI QR Code

향상된 사용자 편의성을 갖는 안전한 전자 투표 영수증 발급 방식

A Secure Receipt Issuing Scheme for e-Voting with Improved Usability

  • 이윤호 (성균관대학교 정보통신공학부 정보보호연구소) ;
  • 이광우 (성균관대학교 정보통신공학부 정보보호연구소) ;
  • 박상준 (성균관대학교 정보통신공학부 정보보호연구소) ;
  • 김승주 (성균관대학교 정보통신공학부 정보보호연구소) ;
  • 원동호 (성균관대학교 정보통신공학부 정보보호연구소)
  • Lee, Yun-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) ;
  • Lee, Kwang-Woo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) ;
  • Park, Sang-Joon (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) ;
  • Kim, Seung-Joo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) ;
  • Won, Dong-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
  • 발행 : 2007.08.31

초록

현재의 전자투표 시스템은 투표자로 하여금 일방적인 신뢰를 강요하고 있으며, 투표자의 의도대로 기록되었음을 입증하지도 않는다. 전자투표가 종이투표 방식보다 많은 장점을 제공할 것이라고 기대하고 있음에도 불구하고 이러한 신뢰성 결여는 전자투표 실시를 막는 주요 요인이 되고 있다. 많은 전문가들은 투표자에게 투표기가 정확하게 동작하고 있음을 확신시키기 위해 영수증을 발급하는 방안을 긍정적으로 고려하고 있다. 본 논문에서는 이미 잘 알려진 cut-and-choose 방식을 응용한 영수증 발급 방식을 제안한다. 제안하는 방식은 특수한 영수증 출력 장치나 제삼자에 의한 투표기 검증 등이 필요없으며, 기존 방식보다 높은 안전성을 제공한다.

Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proof or confirming evidence of their honesty. This lack of trustworthiness is the main reason why e-voting is not widespread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that their intended votes are casted is to use paper receipts. In this paper, we propose an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known cut-and-choose method. Our scheme does not require any special printers or scanners, nor frequent observations of voting machines. In addition, our scheme is more secure than the previous schemes.

키워드

참고문헌

  1. D.Chaum, 'Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms', Comm. of the ACM, vol. 24, no. 2, pp.84-88, Feb. 1981 https://doi.org/10.1145/358549.358563
  2. S.Goldwasser and S.Micali, 'Probabilistic Encryption', Journal of Computer System Sciences(JCSS), vol. 28, no. 2, pp.270-299, Apr. 1984 https://doi.org/10.1016/0022-0000(84)90070-9
  3. T.ElGamal, 'A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms', IEEE Trans. on Information Theory, vol. IT-31, no. 4, pp.469-472, 1985
  4. M.Naor and A.Shamir, 'Visual Cryptography', Proc. of Advances in Cryptology (Eurocrypt'94), LNCS 950, pp.1-12, 1995
  5. P.Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', Proc. of Advances in Cryptology(Eurocryp'99), LNCS 1592, pp.223-238, 1999
  6. R.Mercuri, 'Rebecca Mercuri's Statement on Electronic Voting,' http://www.notablesoftware.com/RMstatement.html, 2001
  7. C.A.Neff, 'A Verifiable Secret Shuffle and Its Application to E-Voting', Proc. of the 8th ACM Conference on Computers and Communications Security(CCS-8), pp.116-125, 2001
  8. R.Mercuri, 'A Better Ballot Box?', IEEE Spectrum Online, pp.46-50, Oct. 2002
  9. C.A.Neff and J.Adler, 'Verifiable e-Voting: Indisputable Electronic Elections at Polling Places', http://www.votehere.net/vhti/documentation/VH\_VHTi\_WhitePaper.pdf, VoteHere Inc., 2003
  10. D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical, Voter-Verifiable Election Scheme', Technical Report CS-TR-880, University of Newcastle upon Tyne, 2004
  11. P.Golle, M.Jakobsson, A.Juels, and P.Syverson, 'Universal Re-encryption for Mixnets', CT-RSA 2004, LNCS 2964, pp.163-178, 2004
  12. D.Chaum, 'Secret-Ballot Receipts: True Voter-Verifiable Elections', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.38-47, Jan. 2004 https://doi.org/10.1109/MSP.2004.57
  13. D.Evans and N.paul, 'Election Security: Perception and Reality', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.24-31, Jan. 2004 https://doi.org/10.1109/MSECP.2004.1264850
  14. D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical Voter-Verifiable Election Scheme', Proc. of 10th European Symposium on Research in Computer Security(ESORICS2005), LNCS 3679, pp.118-139, 2005
  15. '전자선거추진협의회 공식 출범', http://www.nec.go.kr/notice/report/, 중앙선거관리위원회, 2005
  16. Y.Tsiounis and M.Yung, 'On the Security of ElGamal Based Encryption', Public Key Cryptography 98(PKC'98), LNCS 1431, pp.117-134, 1998
  17. R.Cramer and V.Shoup, 'A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack', Crypto'98, LNCS 1462, pp.13-25, 1998
  18. C.Karlof, N.Sastry and D.Wagner, 'Cryptographic Voting Protocol : A Systems Perspective', Proc. of 14th USENIX Security Symposium(USENIX2005), pp.33-50, 2005
  19. D.Boneh and P.Golle, 'Almost Entirely Correct Mixing with Applications to Voting', Proc. of 9th ACM conference on Computer and Communications Security(CCS), 2002