Identity-based threshold cryptography for electronic voting
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Hi-index | 0.00 |
Electronic voting processes are facing an evolution due to its requirements, especially the ones needed to provide full security. In addition it should reduce costs and increase processing speed. Considering the aforementioned, an electronic voting protocol based on bilinear pairings is presented, which uses the Message Authentication Codes (MAC), the Blind Signature scheme and a scheme of Threshold Identity Based Encryption (IBE). The protocol is divided in four main stages: voting set up, authentication, voting and counting. We consider a responsibility distributed model, in which the votes are decrypted with t of n users. Our protocol presents the first scheme based on Blind Signature and Threshold IBE.