Abstract
Digitization of elections demands end-to-end security of the overall process and hence, cyber security for elections is an important issue. Distributed blockchain technology in e-voting can only provide verification advantages. However, voters’ authenticity, data confidentiality, and intermediaries represent other major concerns in this regard. Existing secure voting frameworks either provide final voting results with the help of trusted intermediaries or provide vote verifiability in an unencrypted domain. At present, there is no such realistic mechanism to assure full security of vote casting and result declaration from cyber threats. Even Microsoft’s ElectionGuard is not free from post-quantum attacks due to additive ElGamal cryptosystem. To achieve effective guards against cyberattacks, we propose a voting framework, which reduces vote transmission overhead on a per-voter basis and supports post-quantum secure automated vote counting and winner selection without any manual intervention with the aid of multi-key homomorphic encryption. Along with suitable preventive measures against double voting, vote rigging, and coercion effects, we include a secure result deciphering process evading the possibility of result alteration using multi-key approach. Though our scheme is scalable for smaller as well as large organizations/communities, encrypted processing is inherently performance-costly. Hence, to reduce the overall timing overhead, encrypted hierarchical processing with zonal segregation and parallel computation have been incorporated. Our proposed scheme demonstrates party-specific vote counting without rank generation within 4 days and 22 h and vote counting with winner rank calculation within 5 days (for four candidates and one hundred thousand voters) without any manual intervention with the support of suitable distributed computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anane, R., Freeland, R., Theodoropoulos, G.: E-voting requirements and implementation. In: The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), pp. 382–392. IEEE (2007)
Anggriane, S.M., Nasution, S.M., Azmi, F.: Advanced e-voting system using paillier homomorphic encryption algorithm. In: 2016 International Conference on Informatics and Computing (ICIC), pp. 338–342. IEEE (2016)
Barman, S., Chattopadhyay, S., Samanta, D.: Fingerprint based symmetric cryptography. In: 2014 International Conference on High Performance Computing and Applications (ICHPCA), pp. 1–6. IEEE (2014)
Bistarelli, S., Mantilacci, M., Santancini, P., Santini, F.: An end-to-end voting-system based on bitcoin. In: Proceedings of the Symposium on Applied Computing, pp. 1836–1841 (2017)
Blaze, M., Braun, J., Hursti, H., Jefferson, D., MacAlpine, M., Moss, J.: DEF CON 26 voting village: Report on cyber vulnerabilities in us election equipment, databases, and infrastructure. DEF CON 26 (2018)
Boyen, X., Haines, T., Müller, J.: Epoque: practical end-to-end verifiable post-quantum-secure e-voting. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 272–291. IEEE (2021)
Chatterjee, A., Sengupta, I.: Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans. Serv. Comput. 13(3), 545–558 (2020)
Chen, H., Chillotti, I., Song, Y.: Multi-Key homomorphic encryption from TFHE. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11922, pp. 446–472. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34621-8_16
Chillotti, I.: https://github.com/ilachill/MK-TFHE
Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: A homomorphic LWE based E-voting scheme. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 245–265. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29360-8_16
Chillotti, I., Gama, N., Georgieva, M., Izabachène, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34–91 (2020)
Gentry, C.: A fully homomorphic encryption scheme. Stanford University (2009)
Hardwick, F.S., Gioulis, A., Akram, R.N., Markantonakis, K.: E-voting with blockchain: an e-voting protocol with decentralisation and voter privacy. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1561–1567. IEEE (2018)
Jabbar, I., Alsaad, S.N.: Design and implementation of secure remote e-voting system using homomorphic encryption. Int. J. Netw. Secur. 19(5), 694–703 (2017)
Masiarek, A., lprichar, L.R.: https://github.com/microsoft/electionguard
Mccorry, P., Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: On secure e-voting over blockchain. Digit. Threats Res. Pract. (DTRAP) 2(4), 1–13 (2021)
Olembo, M.M., Renaud, K., Bartsch, S., Volkamer, M.: Voter, what message will motivate you to verify your vote. In: Workshop on Usable Security, USEC (2014)
Park, S., Specter, M., Narula, N., Rivest, R.L.: Going from bad to worse: from internet voting to blockchain voting. J. Cybersecur. 7(1), tyaa025 (2021)
Shinde, S.S., Shukla, S., Chitre, D.: Secure e-voting using homomorphic technology. Int. J. Emerg. Technol. Adv. Eng. 3(8), 203–206 (2013)
Specter, M.A., Koppel, J., Weitzner, D.: The ballot is busted before the blockchain: a security analysis of voatz, the first internet voting application used in \(\{\)US\(\}\). Federal elections. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1535–1553 (2020)
Watson, C.I., et al.: User’s guide to NIST biometric image software (NBIS) (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Parbat, T., Banerjee, A., Chatterjee, A. (2023). Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-49099-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49098-9
Online ISBN: 978-3-031-49099-6
eBook Packages: Computer ScienceComputer Science (R0)