Cryptanalysis on Mu--Varadharajan's e-voting schemes
Applied Mathematics and Computation
A Cryptographic Scheme for Computerized Elections
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Anonymous Secure E-Voting Over a Network
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Towards a Practical, Secure, and Very Large Scale Online Election
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
An Anonymous Electronic Voting Protocol for Voting Over The Internet
WECWIS '01 Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01)
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Hi-index | 0.00 |
In this paper we present a fully functional RSA/DSA-based e-voting protocol for online elections that corrects and improves a scheme previously proposed by Lin- Hwang-Chang [I. Lin, M. Hwang, C. Chang, Security enhancement for anonymous secure e-voting over a network, Comput. Stand. Interfaces 25 (2) (2003) 131-139.]. We found that Lin-Hwang-Chang's scheme and a recent modification of it by Hwang-Wen-Hwang [S. Hwang, H. Wen, T. Hwang, On the security enhancement for anonymous secure e-voting over computer network, Comput. Stand. Interfaces 27 (2) (2005) 163-168.] have an important weakness. Moreover, the scheme proposed by Yang-Lin-Yang [C. Yang, C. Lin, H. Yang, Improved anonymous secure e-voting over a network, Information and Security 15 (2) (2004) 185-191.] also suffers from this same problem. We describe in detail our findings and propose a new scheme to overcome the weakness we found in these schemes effectively. Finally, we describe the implementation details of our protocol and present its preliminary performance evaluation.