Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.4.75

A Secure Receipt Issuing Scheme for e-Voting with Improved Usability  

Lee, Yun-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Lee, Kwang-Woo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Park, Sang-Joon (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Kim, Seung-Joo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Won, Dong-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Abstract
Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proof or confirming evidence of their honesty. This lack of trustworthiness is the main reason why e-voting is not widespread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that their intended votes are casted is to use paper receipts. In this paper, we propose an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known cut-and-choose method. Our scheme does not require any special printers or scanners, nor frequent observations of voting machines. In addition, our scheme is more secure than the previous schemes.
Keywords
Electronic Voting; Receipt; Voter Verifiable Receipt;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R.Mercuri, 'Rebecca Mercuri's Statement on Electronic Voting,' http://www.notablesoftware.com/RMstatement.html, 2001
2 D.Chaum, 'Secret-Ballot Receipts: True Voter-Verifiable Elections', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.38-47, Jan. 2004   DOI   ScienceOn
3 Y.Tsiounis and M.Yung, 'On the Security of ElGamal Based Encryption', Public Key Cryptography 98(PKC'98), LNCS 1431, pp.117-134, 1998
4 C.Karlof, N.Sastry and D.Wagner, 'Cryptographic Voting Protocol : A Systems Perspective', Proc. of 14th USENIX Security Symposium(USENIX2005), pp.33-50, 2005
5 T.ElGamal, 'A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms', IEEE Trans. on Information Theory, vol. IT-31, no. 4, pp.469-472, 1985
6 '전자선거추진협의회 공식 출범', http://www.nec.go.kr/notice/report/, 중앙선거관리위원회, 2005
7 R.Mercuri, 'A Better Ballot Box?', IEEE Spectrum Online, pp.46-50, Oct. 2002
8 C.A.Neff, 'A Verifiable Secret Shuffle and Its Application to E-Voting', Proc. of the 8th ACM Conference on Computers and Communications Security(CCS-8), pp.116-125, 2001
9 D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical Voter-Verifiable Election Scheme', Proc. of 10th European Symposium on Research in Computer Security(ESORICS2005), LNCS 3679, pp.118-139, 2005
10 S.Goldwasser and S.Micali, 'Probabilistic Encryption', Journal of Computer System Sciences(JCSS), vol. 28, no. 2, pp.270-299, Apr. 1984   DOI   ScienceOn
11 P.Golle, M.Jakobsson, A.Juels, and P.Syverson, 'Universal Re-encryption for Mixnets', CT-RSA 2004, LNCS 2964, pp.163-178, 2004
12 M.Naor and A.Shamir, 'Visual Cryptography', Proc. of Advances in Cryptology (Eurocrypt'94), LNCS 950, pp.1-12, 1995
13 D.Chaum, 'Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms', Comm. of the ACM, vol. 24, no. 2, pp.84-88, Feb. 1981   DOI   ScienceOn
14 D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical, Voter-Verifiable Election Scheme', Technical Report CS-TR-880, University of Newcastle upon Tyne, 2004
15 D.Boneh and P.Golle, 'Almost Entirely Correct Mixing with Applications to Voting', Proc. of 9th ACM conference on Computer and Communications Security(CCS), 2002
16 P.Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', Proc. of Advances in Cryptology(Eurocryp'99), LNCS 1592, pp.223-238, 1999
17 C.A.Neff and J.Adler, 'Verifiable e-Voting: Indisputable Electronic Elections at Polling Places', http://www.votehere.net/vhti/documentation/VH\_VHTi\_WhitePaper.pdf, VoteHere Inc., 2003
18 D.Evans and N.paul, 'Election Security: Perception and Reality', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.24-31, Jan. 2004   DOI   ScienceOn
19 R.Cramer and V.Shoup, 'A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack', Crypto'98, LNCS 1462, pp.13-25, 1998