[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2023)

Abstract

Digitization of elections demands end-to-end security of the overall process and hence, cyber security for elections is an important issue. Distributed blockchain technology in e-voting can only provide verification advantages. However, voters’ authenticity, data confidentiality, and intermediaries represent other major concerns in this regard. Existing secure voting frameworks either provide final voting results with the help of trusted intermediaries or provide vote verifiability in an unencrypted domain. At present, there is no such realistic mechanism to assure full security of vote casting and result declaration from cyber threats. Even Microsoft’s ElectionGuard is not free from post-quantum attacks due to additive ElGamal cryptosystem. To achieve effective guards against cyberattacks, we propose a voting framework, which reduces vote transmission overhead on a per-voter basis and supports post-quantum secure automated vote counting and winner selection without any manual intervention with the aid of multi-key homomorphic encryption. Along with suitable preventive measures against double voting, vote rigging, and coercion effects, we include a secure result deciphering process evading the possibility of result alteration using multi-key approach. Though our scheme is scalable for smaller as well as large organizations/communities, encrypted processing is inherently performance-costly. Hence, to reduce the overall timing overhead, encrypted hierarchical processing with zonal segregation and parallel computation have been incorporated. Our proposed scheme demonstrates party-specific vote counting without rank generation within 4 days and 22 h and vote counting with winner rank calculation within 5 days (for four candidates and one hundred thousand voters) without any manual intervention with the support of suitable distributed computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 51.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 64.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Anane, R., Freeland, R., Theodoropoulos, G.: E-voting requirements and implementation. In: The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), pp. 382–392. IEEE (2007)

    Google Scholar 

  2. Anggriane, S.M., Nasution, S.M., Azmi, F.: Advanced e-voting system using paillier homomorphic encryption algorithm. In: 2016 International Conference on Informatics and Computing (ICIC), pp. 338–342. IEEE (2016)

    Google Scholar 

  3. Barman, S., Chattopadhyay, S., Samanta, D.: Fingerprint based symmetric cryptography. In: 2014 International Conference on High Performance Computing and Applications (ICHPCA), pp. 1–6. IEEE (2014)

    Google Scholar 

  4. Bistarelli, S., Mantilacci, M., Santancini, P., Santini, F.: An end-to-end voting-system based on bitcoin. In: Proceedings of the Symposium on Applied Computing, pp. 1836–1841 (2017)

    Google Scholar 

  5. Blaze, M., Braun, J., Hursti, H., Jefferson, D., MacAlpine, M., Moss, J.: DEF CON 26 voting village: Report on cyber vulnerabilities in us election equipment, databases, and infrastructure. DEF CON 26 (2018)

    Google Scholar 

  6. Boyen, X., Haines, T., Müller, J.: Epoque: practical end-to-end verifiable post-quantum-secure e-voting. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 272–291. IEEE (2021)

    Google Scholar 

  7. Chatterjee, A., Sengupta, I.: Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans. Serv. Comput. 13(3), 545–558 (2020)

    Article  Google Scholar 

  8. Chen, H., Chillotti, I., Song, Y.: Multi-Key homomorphic encryption from TFHE. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11922, pp. 446–472. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34621-8_16

    Chapter  Google Scholar 

  9. Chillotti, I.: https://github.com/ilachill/MK-TFHE

  10. Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: A homomorphic LWE based E-voting scheme. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 245–265. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29360-8_16

    Chapter  Google Scholar 

  11. Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34–91 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  12. Gentry, C.: A fully homomorphic encryption scheme. Stanford University (2009)

    Google Scholar 

  13. Hardwick, F.S., Gioulis, A., Akram, R.N., Markantonakis, K.: E-voting with blockchain: an e-voting protocol with decentralisation and voter privacy. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1561–1567. IEEE (2018)

    Google Scholar 

  14. Jabbar, I., Alsaad, S.N.: Design and implementation of secure remote e-voting system using homomorphic encryption. Int. J. Netw. Secur. 19(5), 694–703 (2017)

    Google Scholar 

  15. Masiarek, A., lprichar, L.R.: https://github.com/microsoft/electionguard

  16. Mccorry, P., Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: On secure e-voting over blockchain. Digit. Threats Res. Pract. (DTRAP) 2(4), 1–13 (2021)

    Article  Google Scholar 

  17. Olembo, M.M., Renaud, K., Bartsch, S., Volkamer, M.: Voter, what message will motivate you to verify your vote. In: Workshop on Usable Security, USEC (2014)

    Google Scholar 

  18. Park, S., Specter, M., Narula, N., Rivest, R.L.: Going from bad to worse: from internet voting to blockchain voting. J. Cybersecur. 7(1), tyaa025 (2021)

    Article  Google Scholar 

  19. Shinde, S.S., Shukla, S., Chitre, D.: Secure e-voting using homomorphic technology. Int. J. Emerg. Technol. Adv. Eng. 3(8), 203–206 (2013)

    Google Scholar 

  20. Specter, M.A., Koppel, J., Weitzner, D.: The ballot is busted before the blockchain: a security analysis of voatz, the first internet voting application used in \(\{\)US\(\}\). Federal elections. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1535–1553 (2020)

    Google Scholar 

  21. Watson, C.I., et al.: User’s guide to NIST biometric image software (NBIS) (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanusree Parbat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parbat, T., Banerjee, A., Chatterjee, A. (2023). Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49099-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49098-9

  • Online ISBN: 978-3-031-49099-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics