Paper 2009/424

Double Voter Perceptible Blind Signature Based Electronic Voting Protocol

Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, and Javad Mohajeri

Abstract

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this paper, getting Asadpour et al. scheme as one of the latest one and showing its weaknesses, we propose a new voting scheme which is immune to the weaknesses of previous schemes without loosing efficiency. The scheme, is based on a special structure, which directly use the identity of voter, hides it in that structure and reveals it after double voting. We also, show that the security of this scheme depends on hardness of RSA cryptosystem, Discrete Logarithm problem and Representation problem.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Electronic votingAnonymity of voterUnforgeability of ticketPerceptibility of double votingSecurity of votingBlind signature.
Contact author(s)
yaser_baseri @ alum sharif ir
History
2011-03-05: last of 2 revisions
2009-09-01: received
See all versions
Short URL
https://ia.cr/2009/424
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/424,
      author = {Yaser Baseri and Amir S.  Mortazavi and Maryam Rajabzadeh Asaar and Mohsen Pourpouneh and Javad Mohajeri},
      title = {Double Voter Perceptible Blind Signature Based Electronic Voting Protocol},
      howpublished = {Cryptology ePrint Archive, Paper 2009/424},
      year = {2009},
      note = {\url{https://eprint.iacr.org/2009/424}},
      url = {https://eprint.iacr.org/2009/424}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.