Loading...

Security Enhancement of an Electronic Voting Protocol with Minimum Strong Assumptions

Avizheh, Sepideh | 2012

557 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 43749 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Salmasizadeh, Mahmoud
  7. Abstract:
  8. Electronic voting is one of the applications of electronic systems, in which collection and tallying the votes are performed electronically. In electronic voting systems, cryptography is used to provide security requirements but defects of the cryptography have made the electronic voting protocol designers to use strong assumptions which are impractical or hard to implement.In this research, some of the strong assumptions in electronic voting protocols are studied and the soloution of solving them is given. First, the assumption of trusting to the tally authority in electronic voting protocols which are based on deniable authentications is considered and a new internet voting protocol based on deniable authentication is introduced. In this new protocol, the trust assumption to the tally authority has relaxed. Next, the convertible limited multi-verifier signature (CLMVS), which has not already used in voting protocols, is studied and two efficient generic patterns for CLMVS scheme are presented. Then, the first pairing based CLMVS scheme which is secure in the standard model is introduced and used to construct a new electronic voting protocol. This protocol provides deniable authentication’s property and removes the assumption of coercion immunity for the tally authority. Finally, strong physical assumptions and using deniable encryption for removing them are spotlighted; hence, we first show that the Meng and Wang’s deniable encryption algorithm has several errors and the voting protocol which has designed based on it is also incorrect. Then, we use the Ibrahim’s one bit deniable encryption algorithm to improve the Chen et al. voting protocol by removing the untappable channel in voting stage, practically and efficiently.
  9. Keywords:
  10. Electronic Voting ; Receipt-Freeness ; Deniable Authentication ; Convertible Limited Multi-Verifier Signature ; Deniable Encryption

 Digital Object List

 Bookmark

No TOC