TY - GEN
T1 - A practical approach to a reliable electronic election
AU - Lee, Kwangwoo
AU - Lee, Yunho
AU - Kim, Seungjoo
AU - Won, Dongho
N1 - Funding Information:
This research was supported by the Ministry of Knowledge Economy, Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2009-(C1090-0902-0016)).
PY - 2009
Y1 - 2009
N2 - A receipt used for electronic voting is a key component of voting techniques designed to provide voter verifiability. In this paper, we propose electronic voting scheme involving issuing a receipt based on the cut-and-choose mechanism. Compared with Chaum et al.'s scheme[3], this scheme does not require large amounts of physical ballots and trust assumptions on tellers. Furthermore, it is as efficient and user-friendly as any of the existing electronic voting schemes issuing receipts described in the relevant literature. They only require simple comparisons between the screen and the receipt during voter's voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.
AB - A receipt used for electronic voting is a key component of voting techniques designed to provide voter verifiability. In this paper, we propose electronic voting scheme involving issuing a receipt based on the cut-and-choose mechanism. Compared with Chaum et al.'s scheme[3], this scheme does not require large amounts of physical ballots and trust assumptions on tellers. Furthermore, it is as efficient and user-friendly as any of the existing electronic voting schemes issuing receipts described in the relevant literature. They only require simple comparisons between the screen and the receipt during voter's voting process. This scheme is provably secure under the fact that the ElGamal encryption cryptosystem is semantically secure. We implemented the proposed scheme in according to the defined implementation requirement and provide the security analysis of the scheme.
KW - Cut-and-choose
KW - Electronic voting
KW - Paper receipt
UR - http://www.scopus.com/inward/record.url?scp=70350635800&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02457-3_17
DO - 10.1007/978-3-642-02457-3_17
M3 - Conference contribution
AN - SCOPUS:70350635800
SN - 3642024564
SN - 9783642024566
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 191
EP - 203
BT - Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings
T2 - International Conference on Computational Science and Its Applications, ICCSA 2009
Y2 - 29 June 2009 through 2 July 2009
ER -