Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Towards a Practical, Secure, and Very Large Scale Online Election
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
A secure voter-resolved approval voting protocol over internet
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Practical distributed voter-verifiable secret ballot system
Proceedings of the 2009 ACM symposium on Applied Computing
A novel simple secure internet voting protocol
Proceedings of the 2011 International Conference on Communication, Computing & Security
Measures to establish trust in internet voting
Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In this paper, we propose a protocol for voting in democratic election over internet which will utilize the concept of Distributed ElGamal Cryptosystem. We will mathematically show how ElGamal Cryptosystem can be used to split the decryption key into several pieces and distributing these pieces among candidates who are contesting the election. Each candidate will decrypt the vote by using his share of decryption key and then the final result will be obtained by combining the partially-decrypted vote. The active participation of candidates in decrypting the vote will increase the trust of the candidates on the voting system which will be a major breakthrough towards successful organisation of election over internet. Our protocol satisfies all the major requirements of an ideal voting protocol, such as security of votes and privacy of voters.