• Title/Summary/Keyword: Internet Electronic Voting

Search Result 18, Processing Time 0.019 seconds

Aspects of Regulatory and Legal Implications on evoting

  • Kosmopoulos, Athanassios
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.311-331
    • /
    • 2004
  • This paper addresses the democracy-oriented regulatory and legal requirements that e-democracy impacts. It demonstrates that the structure of the political system also plays a significant role in the decision to develop an e-voting application. The short term perspective of the questions put before the electorate obliterate the long term perspective in which many policy problems have to be seen. A well-designed e-voting system should produce an audit trail that is even stronger than that of conventional systems (including paper-based systems). Remote Internet voting systems pose significant risk to the integrity of the voting process, and should not be fielded for use in public elections until substantial technical and social science issues are addressed. Conclusively the paper focuses on the specific attributes an electronic voting (polling place) system should respect and ensure such as transparency, verifiability, accountability, security and accuracy in relation to the constitutional requirements such as General, Free. Equal, Secret, Direct and Democratic.

  • PDF

A Fast and Secure Method to Preserve Anonymity in Electronic Voting (전자투표에서 익명성 보장을 위한 빠르고 안전한 방식)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.245-251
    • /
    • 2014
  • Mix network plays a key role in electronic voting to preserve anonymity and lots of mixnet schemes have been proposed so far. However, they requires complex and costly zero-knowledge proofs to provide their correct mixing operations. In 2010, Seb$\acute{e}$ et al. proposed an efficient and lightweight mixnet scheme based on a cryptographic secure hash function instead of zero-knowledge proofs. In this paper, we present a more efficient and faster mixnet scheme than Seb$\acute{e}$ et al.'s scheme under the same assumption. Also, our scheme is secure.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

Applied Practices on Blockchain based Business Application

  • Park, Bo Kyung
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.198-205
    • /
    • 2021
  • With the development of blockchain technology, the scope of blockchain applications has expanded rapidly. Blockchain decentralization allows transaction participants to make transparent and safe transactions without a third trust agency. A distributed ledger-based system enables transparent and trusted business for anonymous users. For this reason, many companies apply blockchain to various fields such as logistics, electronic voting, and real estate. Despite this interest, there are still not enough case studies confirming the potential of blockchain as a concrete business model. Therefore, it is necessary to study how blockchain technology can change the existing business model and connect it to a new business model. In this paper, we propose blockchain-based business models and workflow types in various fields such as healthcare, logistics, and energy. We also present application cases. We expect to help companies apply blockchain to their business.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

The Effect of the Fake News Related to the Electronic Voting System each News Service on News Users' Attitude of Using System, Intention to Participate through System and Reliability of News Services (뉴스서비스별 전자투표시스템 관련 가짜뉴스가 뉴스 이용자의 이용 태도, 선거 참여 의도, 뉴스서비스 신뢰도에 미치는 영향)

  • Jin, So-Yeon;Lee, Ji-Eun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.105-118
    • /
    • 2021
  • This study pays attention to the fact that the fake news is attracting attention because it causes various social problems. To find out these fake news' influence, the study conducted the experiment to examine that the fake news related to the electronic voting system affects on the news users' attitude of using the system, intention to participate in the election through the system and reliability of news services. The results have shown that the fake news framed with negative contents reduced users' attitude of using the system and intention of participation in the election. Especially, as a result of examining the difference in the fake news' influence according to each news services, in the case that users recognized that the news was fake after exposing to the general internet news, the attitude of using the system and the intention of participation in the election have reduced and recovered again. However, users who exposed to Naver, Facebook believed the negative content of the fake news more strongly. Through these results, this study empirically confirmed that the fake news has a tendency to exert influence on users' cognitive dimension and to reinforce awareness in a direction consistent with the initial exposure information.

Demand Analysis of Technology Development for Smart Village based on Community Activities (공동체 활동을 기반으로 한 스마트빌리지 기술개발 수요분석)

  • Park, So Yeon;Cho, Hyejin;Jung, Nam-Su
    • Journal of Korean Society of Rural Planning
    • /
    • v.26 no.2
    • /
    • pp.117-126
    • /
    • 2020
  • In this study, demands of smart technology development were analyzed for rural village communities. Questionnaire items were derived by grasping the current status of information and communication technology. 49 villages in 8 regions were selected and surveys and statistical analysis were conducted. The main results of the study are as follows. First, 92% of community leaders use smartphones, search for information (38%), communicate with the Internet (36%) using smartphones, use KakaoTalk (31%), and Facebook (24%). Second, in the rural and urban exchange activities, promote support information service (51%) and promote method suggestion service (48.5%) showed that the demand for services in promote field was high. It is linked to the creation of economic opportunities. Third, in the income and production activities, demand for distribution services technology (39.3%) was high in the field of production and distribution, and cold chains that help maintain freshness until food, such as meat, fish, and vegetables are delivered to consumers when agricultural products are distributed. The constant temperature control system needs to be actively introduced. Fourth, autonomy activities showed the highest demand for air conditioning and control systems (34.2%) of community building, and the lowest demand for electronic voting (9.4%) and videoconferencing (9.4%) services. Lastly, in the general activity area of the community, the demand for technology of emergency services (37.1%) and health self-diagnosis service (35.4%), which are technologies in the welfare sector, ranked first and second respectively.