M-NOTE: A Multi-part ballot based E-voting system with clash attack protection

In this paper, we propose an E-voting procedure which, by utilizing the multi-part ballot mode, provides voters an enhanced way to cast and audit their own votes with great anonymity. The proposed scheme, the Multi-part ballot based Name and vOte separaTed E-voting system (M-NOTE), is partially based on our previous works, which have achieved the goal of keeping candidates confidential and voters anonymous, as well as reducing the risk of leaking both candidates' and voters' identities during the ballot distribution phase. In addition, M-NOTE can prevent the possible clash attack in which either malicious authority or hackers could partially manipulate voting results by tampering voters' original ballots. Meanwhile, our performance analysis shows that M-NOTE provides an outstanding secured level, as the possibility of ballot reconstruction and voting result manipulation has been reduced to closer to zero. This E-voting system also illustrates to readers an applicable framework of designing a fair election in the future.

[1]  Chuankun Wu,et al.  Internet voting: concerns and solutions , 2002, First International Symposium on Cyber Worlds, 2002. Proceedings..

[2]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[3]  Nirwan Ansari,et al.  RE-NOTE: An E-voting scheme based on ring signature and clash attack protection , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[4]  Nirwan Ansari,et al.  E-NOTE: An E-voting system that ensures voter confidentiality and voting accuracy , 2012, 2012 IEEE International Conference on Communications (ICC).

[5]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[6]  Stefan Popoveniuc,et al.  An Introduction to PunchScan , 2010, Towards Trustworthy Elections.

[7]  Hung-Yu Chien,et al.  RSA-based partially blind signature with low computation , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.

[8]  Ralf Küsters,et al.  Clash Attacks on the Verifiability of E-Voting Systems , 2012, 2012 IEEE Symposium on Security and Privacy.

[9]  Ben Adida,et al.  Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.

[10]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[11]  Chao Zhang,et al.  Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records , 2008, IEEE Security & Privacy.

[12]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[13]  Michael D. Byrne,et al.  Usability of voting systems: baseline data for paper, punch cards, and lever machines , 2007, CHI.

[14]  Lorrie Faith Cranor,et al.  Sensus: a security-conscious electronic polling system for the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[15]  Warren D. Smith Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.

[16]  Nirwan Ansari,et al.  Ensuring voters and candidates' confidentiality in E-voting systems , 2011, 34th IEEE Sarnoff Symposium.

[17]  Indrajit Ray,et al.  An anonymous electronic voting protocol for voting over the Internet , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.

[18]  Nirwan Ansari,et al.  Enhanced name and vote separated E-voting system: an E-voting system that ensures voter confidentiality and candidate privacy , 2014, Secur. Commun. Networks.

[19]  Gwoboa Horng,et al.  A practical voting system for small-scale election , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..