Abstract

In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to the specified government election server. Finally, the election server administrator will sort the final result by deciphering the received encrypted information using RSA private key. Actually, this E-Voting protocol is more efficient than others E-Voting protocols since the voter can vote from his/her own personal computer (PC) without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial.

Highlights

  • A trustworthy voting system is crucial to a population’s consent, as democracies are built on this consent

  • The technology of electronic voting (E-Voting) is used to support the citizen to contribute in decision making in a democratic way

  • This paper has shown the possibility of establishing E-Voting protocol based on public-key encryption cryptosystem

Read more

Summary

INTRODUCTION

A trustworthy voting system is crucial to a population’s consent, as democracies are built on this consent. E-Voting is an election system that allows a voter record his or her secure and confidential ballot electronically. Resulting from human unreliability in cryptographic protocols, and denial of service These attacks could compromise election integrity, erode voter privacy, and enable vote coercion. In Egyptian E-Voting protocol [2], the authors discovered an Electronic Voting System in Egypt (EVSE) scheme This scheme is designed to fit in the environment and the conditions of Egypt, trying to solve problems in the old system, conventional system. A Simple Protocol for Yes-No Electronic Voting [3], exposed a new electronic voting protocol based on the bit operation XOR and the use of blind signatures It is an algorithm designed expressly for the case in which is necessary to choose between two candidates or two options. It is shown that the proposed algorithm satisfies the more important requirements of any E-Voting scheme: anonymity, completeness, correctness and uniqueness

INFORMATION SECURITY AND CRYPTOGRAPHY
Cryptography
Public Key Encryption
RSA Public-Key Encryption Protocol
THE PROPOSED PUBLIC-KEY CRYPTOGRAPHIC E-VOTING PROTOCOL
System Access Control Process
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call