PRIVACY PRESERVING IN ELECTRONIC VOTING

Similar documents
On Some Incompatible Properties of Voting Schemes

CHAPTER 2 LITERATURE REVIEW

A homomorphic encryption-based secure electronic voting scheme

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

An untraceable, universally verifiable voting scheme

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

Secure Electronic Voting

Privacy of E-Voting (Internet Voting) Erman Ayday

Addressing the Challenges of e-voting Through Crypto Design

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

Ad Hoc Voting on Mobile Devices

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

A Receipt-free Multi-Authority E-Voting System

SECURE e-voting The Current Landscape

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

PRIVACY in electronic voting

Swiss E-Voting Workshop 2010

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Towards a Practical, Secure, and Very Large Scale Online Election

Blind Signatures in Electronic Voting Systems

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

An Application of time stamped proxy blind signature in e-voting

Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

Security Analysis on an Elementary E-Voting System

2 IEICE TRANS. FUNDAMENTALS, VOL., NO. to the counter through an anonymous channel. Any voter may not send his secret key to the counter and then the

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots

Voting Protocol. Bekir Arslan November 15, 2008

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Survey of Fully Verifiable Voting Cryptoschemes

E- Voting System [2016]

Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer

Secure and Reliable Electronic Voting. Dimitris Gritzalis

The usage of electronic voting is spreading because of the potential benefits of anonymity,

Estonian National Electoral Committee. E-Voting System. General Overview

Receipt-Free Homomorphic Elections and Write-in Ballots

A Design of Secure Preferential E-Voting

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia

Electronic Voting Systems

A Robust Electronic Voting Scheme Against Side Channel Attack

Johns Hopkins University Security Privacy Applied Research Lab

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

A Verifiable Voting Protocol based on Farnel

Receipt-Free Universally-Verifiable Voting With Everlasting Privacy

Paper-based electronic voting

A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Secured Electronic Voting Protocol Using Biometric Authentication

REVS A ROBUST ELECTRONIC VOTING SYSTEM

RECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY

The Effectiveness of Receipt-Based Attacks on ThreeBallot

福井大学審査 学位論文 博士 ( 工学 )

Formal Verification of Selene with the Tamarin prover

Functional Requirements for a Secure Electronic Voting System

Privacy in evoting (joint work with Erik de Vink and Sjouke Mauw)

Remote Internet voting: developing a secure and efficient frontend

Distributed Protocols at the Rescue for Trustworthy Online Voting

An Introduction to Cryptographic Voting Systems

Large scale elections by coordinating electoral colleges

Towards Trustworthy e-voting using Paper Receipts

Pretty Good Democracy for more expressive voting schemes

An Object-Oriented Framework for Digital Voting

Individual Verifiability in Electronic Voting

An Overview on Cryptographic Voting Systems

L9. Electronic Voting

Human readable paper verification of Prêt à Voter

Author(s) Takabatake, Yu; Kotani, Daisuke; Ok.

A Study on Ways to Apply the Blockchain-based Online Voting System 1

Split-Ballot Voting: Everlasting Privacy With Distributed Trust

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV

Cryptographic Voting Protocols: Taking Elections out of the Black Box

A Verifiable E-voting Scheme with Secret Sharing

SECURE REMOTE VOTER REGISTRATION

Selene: Voting with Transparent Verifiability and Coercion-Mitigation

Coercion-Resistant Hybrid Voting Systems 1

Towards Secure Quadratic Voting

Running head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams

E-Voting Systems Security Issues

SMS based Voting System

A Secure and Anonymous Voter-Controlled Election Scheme

Selectio Helvetica: A Verifiable Internet Voting System

How to challenge and cast your e-vote

arxiv: v3 [cs.cr] 3 Nov 2018

Brittle and Resilient Verifiable Voting Systems

TokenVote: Secured Electronic Voting System in the Cloud

E-Voting Solutions for Digital Democracy in Knowledge Society

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Between Law and Technology: Internet Voting, Secret Suffrage and the European Electoral Heritage

Thoughts On Appropriate Technologies for Voting

Accessible Voter-Verifiability

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

Uncovering the veil on Geneva s internet voting solution

A Secure Paper-Based Electronic Voting With No Encryption

Election Day Manual for Polling Agents. Monitoring Elections in Pakistan

E-Voting, a technical perspective

Cobra: Toward Concurrent Ballot Authorization for Internet Voting

Using Prêt à Voter in Victorian State Elections. EVT August 2012

Transcription:

PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam Email: {thaonguyen, khanh}@cse.hcmut.edu.vn Received Date: January 17, 2012 Electronic voting becomes a new tendency in many countries. It brings many benefits such as providing more convenience for voters to increase the potential voter turnout, reducing errors during counting phase, reducing costs and efforts, increasing democracy, etc. Benefits, however, always come along with challenges. The main concern is how to ensure the security of electronic voting systems, especially to preserve the voter privacy. In previous studies, researchers introduced a large number of requirements of electronic voting systems and provided the protocols satisfying as many requirements as possible. In this paper, we not only provide a comprehensive view of electronic voting systems but also analyze the privacy issues in the voting context. From these analyses, we introduce general architecture for privacy preserving in electronic voting, and then discuss possible techniques for addressing the related privacy issues. Keywords: Cryptography, Electronic Voting, Internet Voting, Privacy, Secure Multiparty Computation Introduction In recent years, the Internet has demonstrated the exceeding growth rate which no previous technologies could obtain. Along with the rapid growth of internet using, many electronic commerce services have been brought into reality, replacing traditional ones which become more and more backward and time-wasting. Nowadays, people prefer the convenience of staying at home, buying things via Internet, making contract with partners online, or sometimes fulfilling governmental procedures without having to present at the administrative bodies like they used to. Being aware of those needs, the Governments worldwide have tried to digitalize their services as much as possible, turning them into electronic Government (e-government) services. Among e-government services, electronic Voting (e-voting) is one of the most important services for its characteristic and impact on the whole country. It is obvious that voting itself is the key of democracy. It is a regular activity of a nation in order for the citizens to raise their opinions on the political issues they are concerned about. The traditional voting (also called voting by paper or signature voting [6]) is often held in public places under the supervision of Government officials to ensure the voting process fully meets the requirements set before election period. More concretely speaking, supervisors have to check whether the person who comes to the polling place is an eligible voter or not, they also have to guarantee that every valid voter casts his or her vote without any coercion or cheating. To complete this job on a large scale, it takes a lot of time, money and efforts, but nothing can assure there are no violations in this casting phase. In addition, when voters fulfill their duty in voting process, the Government officials have to count each paper ballot. The problem is that no matter how much efforts you make, human being cannot count a huge number of paper-ballots without a single mistake. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.23

That is just one aspect of how problematic traditional voting could be. Another aspect relates to the other partner of voting process - voters. The drawbacks of traditional voting make voters feel inconvenient. What do you suppose to do if the Election Day is in your working day and voting booth is far away from your office? In this case, you may feel that election is somewhat annoying, which results in your denying the right to vote. Voting thus is no longer the key of democracy. And that is exactly the reason electronic voting needs to be brought into reality. At first, electronic voting system only included a machine which could automatically count the punch cards considered as ballots. You can learn more about the development of voting machine in [9]. However, that machine only helped election officials get the final result of voting process quickly, the registration and validation phase were still the same as traditional voting system. Voters had to go to the booths to cast their vote under the supervision of Government officials. These procedures thus consumed much resource. Therefore, the idea of Internet Voting in which voter only needs to send his or her vote to the election committee via internet appeared. For its advantages, Internet voting starts drawing attention of not only Governments but also companies, organizations, etc. But as usual, great opportunities are accompanied by challenges. The first challenge that has to be addressed is security, especially privacy. How can we protect the content of votes against the vote-buying and the coercion? How can we conceal the identification of a voter from the curiosity of adversaries inside and outside the system? These are the questions that need to be answered before implementing the Internet voting system. Moreover, Internet voting is more vulnerable than other voting systems [7]. The second challenge is the practical aspect of Internet Voting system in which every paper is digitalized, leading to the fact that voters can no longer see where their votes are going to as they used to in traditional voting. Consequently, they may be suspicious about the final result of voting process. The paper is organized as follows: in the next section we will provide the comprehensive view of electronic voting. Section 3 will discuss the privacy issues and other requirements of electronic voting. Section 4 will propose general architecture for privacy issues of e-voting system. Section 5 provides some techniques applied to the architecture above. And finally, conclusion and future work are included in section 6. Overview of Electronic Voting Definition of Electronic Voting Electronic voting is simply the measure to capture the voter s selections by digital data [7]. There are many voting forms all over the world depending on the purpose of voting such as: presidential election, election of a legislature, referendum And each of the forms has its own way for voters to cast the ballot as well as for voting authorities to choose the winner. One choice: every voter has only one ballot to cast his or her vote. In every ballot, there is only one candidate chosen by voter. The winner is the one who gets the most credits, meaning he receives the greatest number of votes in the election. Multi choices: one voter can choose many candidates in his ballot at a time. In this model, there are three ways that voter can pick up their preferable candidates. o Non preferential voting: every choice is the same. o Ranked voting: a voter orders the candidate s position in his ballot according to his preference. o Rated voting: a voter is allowed to compare candidates in quality and quantity. This means voters can give each of candidates a score showing how much they want this candidate to be a winner. In this kind of voting model, every assessment is absolutely independent. This model is more ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.24

flexible than previous ones, but it s so hard to calculate the final result that few scheme are designed to use it. However, no matter what form the voting system belongs to, it always has four main phases for voters to complete their voting process. Registration: the citizen who has the right to take part in the voting process will register to the Government. If they are eligible, the election roll will be created and they will become voters. Authentication: before casting his vote, the voter has to prove himself to the system. Casting: the voters cast their vote. Tallying: All the votes will be counted at this phase. At the end of this phase, the final result will be announced to public. Figure 1. Four main phases of voting process Each of above phases can be implemented by physical or electronic procedures. If system is called electronic voting system, it has at least the tallying phase to be digitalized. Classification of Electronic Voting System From the historical point of view, voting system has been developing from centralized voting in a single Town Hall, to distributed polling place voting, and recently, to remote connectivity through the Internet, called Internet Voting. Briefly, electronic Voting is classified into two main types as we can see below. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.25

Polling place Voting Voters have to gather into some polling booths, and then cast their vote by the voting machines. Both voters and voting machines are also supervised by voting authorities. In this type of voting system, just two phases, casting and tallying, are digitalized; the others are still same as traditional voting system. Internet Voting Figure 2. Model for polling place voting system There are no needs to waste any money or time to supervise the physical environment such as voting machines, polling-booths, ballots or voters because the processes are done via the Internet. In this type of voting system, all of four phases are digitalized. The privacy issues in voting system Figure 3. Model for internet voting system Privacy is the most important issue in electronic voting. Before finding out the way to preserve the privacy, we have to know what the privacy in voting context is. In [11], the privacy of voting system is defined that: A secret ballot protocol is said to be private if the privacy of voters is preserved. However, voter is not the only one component of voting system, another component that is not less important is the vote. Therefore, in this paper, we divide the concept of privacy of voting system into two aspects: privacy of vote and privacy of voter. Privacy of vote In this context, privacy means no one can know exactly what contents are in this ballot except voter. And if the voter speaks out what candidate he chosen, he still has no ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.26

evidences to prove what he said. There are two concepts involved in the privacy of vote: Perfect Privacy and Ballot Secrecy. In [5], the authors introduced the concept of Perfect Privacy. It states that e-voting system is called perfectly private if the information that an adversary maybe learn from a voter s choice also can be learned if that voter chooses another candidate. In reality, voting process and system always have some leaks no matter how we prevent, so sometimes an adversary can obtain a little information from these sources. But if the voting system provides a perfect privacy, the information the adversary gets from the leaks or the corrupted voting authorities of the voting system cannot help him infer the true vote cast by the voter on Election Day. Ballot secrecy was defined in [5] that: the e-voting system is called perfect ballot secrecy if there is no way for anyone to prove to an adversary his or her real choice in the ballot even if the voter colludes with the adversaries. This property is also defined clearly in other way in [7][8]. According to these references, we can divide this property into two small requirements: Uncoercibility: the adversary cannot force any voters to vote for his own intention or to reveal their votes. This property is to avoid the attack of the outside threats. In this case, the coercer is the adversary. Receipt-freeness: with the receipt-freeness, no voter can prove the result of his voting process to the person wanting to buy the vote. This property is to avoid the attack of the inside threats. In this case, the voter himself is the adversary. All these concepts above focus on the privacy of the individual votes. In [11], the authors introduced another requirement which preserves the privacy of a whole votes used to calculate the final result. That is fairness. It means that no one including voting authorities can get the intermediate result of the voting process before the final result is announced to public. In summary, the voting system providing Privacy of Vote should keep the content of all votes unrevealed by the voting authorities who stay inside the system or even the voters themselves. More concrete speaking, the attackers outside the system cannot get the information even though they can collude with most of the voting authorities and coerce the voters. Privacy of voter In the definitions above, we can see that the voting system satisfying these requirements will protect the content of vote while the privacy of voter will emphasis the preserving privacy of voter s identity. In [6], the authors introduced the anonymous requirement which has the closest meaning with the privacy of voter. It states that each individual vote cannot be linked to the voter who cast it. However, if the voting system just ensures the anonymity of voter, some objects such as the voting authorities can read the plaintext of votes so they can know the intermediate result before the publication phase. This result can affect the final result of voting process because it influences on the voter s psychology, therefore the final result can be deviated from the true desires of most voters. Therefore, the voting system needs to achieve the privacy of vote and the privacy of voter to ensure the privacy of the whole system. Other requirements for voting system In [6], the authors provided a general view of electronic voting requirements, as followings ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.27

Completeness: every voter who satisfies the voting policies of Government is always accepted to cast their vote. Integrity: It means that the votes cannot be modified, rejected, deleted, forgotten, or not be counted by any objects in the system (including the person who has a full access control). In other words, the votes will remain in original forms as they were cast by the voters in any cases. In [2], it is the important requirement because if a vote is modified, the final result can not reflect the true intention of voters though the computation processes make no mistakes. Robustness: this is an important requirement to take an electronic voting system into practice. In [11], the robustness means that no one (including authorities) can disturb or disrupt an election and the voting process of each voter is independent of others. Though an adversary tries to steal the private data of a voter to interfere with voter s intention or to stop their own voting process in order to disturb others processes, the election still work till the last phase. Uniqueness: this requirement prevents a voter from casting more than one ballot. In [11], the uniqueness is defined that: Every voter votes exactly one time. Though, some voting protocols allow their clients to vote many times in Election Day, only their last vote is accepted by voting authorities. Verifiability: This is an essential requirement of electronic voting system. It helps the system take more credits of clients; therefore voters will do their voting duty more actively than they have to do in a voting system that they are not sure about the reliability of its output. According to [12], we have two types of verifiability: o Individual verifiability: In [7], this concept is also called atomic verifiability but the main meaning is the same. This requirement requires that every voter is able to check whether their vote is counted correctly or not. However, it seems very difficult to prove to voters that their vote is casted as intended while the receipt-freeness requirement is still satisfied. This is a remarkable problem which is discussed in [1]. o Universal verifiability: It means that every voter who is interested in tally result can collect the information from voters and voting authorities to ensure that the final result is correctly computed from all the ballots casted by eligible voters. Convenience: if a voting system satisfies this requirement, it must help voters not only to cast their vote quickly in one session but also to complete their voting process with the special skills as least as possible. Efficiency: the computations used in the voting system labeled efficiency have to be done in the tolerable time, and any voter in such a system doesn t need to wait for the others to complete their voting process in order to do his or her own. Mobility: it means the voters can cast their vote any time they feel comfortable and any place they are in Election Day. So they don t need to pay any attention to the physical environment as they used to do with the traditional voting system. However, this requirement seems to collide with the uncoercibility because if they cast their vote in their private place, nothing can ensure they cast their vote without any coercion. Architecture As mentioned above, the voting process will take place in four main phases: Registration, Authentication, Casting and Tallying (Counting). Consequently, the architecture will have four main features representing the four phases. To ensure the security of e-voting system, ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.28

we add two more features undertaking the duties of preserving the privacy of voter s identity and privacy of vote s content as illustrated in Figure 4. In this architecture, the voter will use his computer to access the Internet in order to perform voting process. At first, he sends request to Registration server which is responsible for asking Certificate Authority about voter s personal information to check whether he satisfies voting policy or not. If the client is an eligible voter, Registration Server will send the certificate to voter. After that, voter sends this certificate to Privacy of Voter Server to transform his real ID into anonymous ID that will be used in later voting steps. To keep the identity of voter completely secret, no party in the system can acknowledge the link between the real ID and the anonymous one. It means that even the Privacy of Voter Server should not have any idea about the content of the real ID which it is going to blind. To satisfy this requirement, we can use blind signature technique introduced in the section below. Based on the anonymous ID and the corresponding blind signature, the voting authorities can check whether this voter is eligible or not without knowing his real identity. Figure 4. Architecture for privacy preserving in electronic voting To protect the content of the vote against being modified or revealed to anyone, we add the Privacy of Vote Server into the voting process. Privacy of Vote Server will blind the content of vote before voter starts his casting phase. We can use some of the typical cryptographic techniques introduced below to implement this feature. Another problem here is how to ensure the voting authorities do not decrypt the ciphertext of votes to modify the ballots or to gain the intermediate result. This problem can be solved by digital signature, hash function or threshold cryptography briefly introduced in [3]. Besides, in [4], we can find a simple method to avoid coercer and vote-buying which are important threats to privacy of vote. The simple method that does not require the complicated cryptographic techniques can be the recasting mechanism without sacrificing uniqueness requirement. This mechanism was first introduce in [3][4]. Finally, when the election period is over, the Tallying Server will perform. In this architecture, Public Board will announce the final result of the voting process. In some protocols, Public Board will update voter s status for voter to verify that his vote has been casted as intended. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.29

The cryptographic techniques Privacy-preserving in electronic voting is an instance of SMC (secure multiparty computation) problem, where we want to find the outcome (final result) but we do not want to reveal the inputs (votes) to any party who jointly computes the final result. The idea of secure multiparty computation was first introduced by Yao in the paper [16]. To solve the SMC problem, many researchers created a protocol using cryptographic techniques. Therefore, in this paper, we will introduce three main cryptographic techniques to protect privacy in the voting context we discussed above. Mix-net The concept of mix-net was first introduced by Chaum [18]. A mix net is composed of a set of linked servers called mixes. Each of mixes only takes all the encrypted votes at one time, it will decrypt these votes by its private key, disorder and then send them to the next mix to do the same process. The process will be show as follows At first a voter will choose his most favorite candidate then show it on the ballot. After that, he will then encrypted it m times in succession by m public keys of m different mixes. At the tallying phase, all the votes are decrypted in reserve order of encrypting process by the private keys of each mix. This technique can conceal the identities of voters and protect the content of votes before the final result is announced publicly. Besides that, a useful property of mix-nets is universal verifiability because the encrypted vote will become a plain-text after going through the mix-nets so it is easy to check the final result is correct or not. However, the main drawback of this technique is that it requires a large number of communication and computation costs. Moreover, if any linked servers of those in mix-net become an adversary, the final result will be wrong. That means the result of mix-net belongs to the operations of all linked servers. So far, there are no electronic mix net-based voting systems that are implemented especially on the large scale which requires a lot of mixes. Homomorphic cryptography Homomorphic cryptography is a type of encryption in which the result of an algebraic operation calculated by the plaintext is equivalent to the result of another algebraic operation calculated by the ciphertext. It is based on the homomorphism in abstract algebra. And this property has been used to create many secure voting protocols [10]. We denote E(x) as the encryption of message x, the encryption is homomorphic if and only if by E(x) and E(y), we can calculate E(x y) without decrypting neither E(x) nor E(y). E(x) E(y) = E(x y) In the expression above, the operation is defined on the cipher space, while the operation is defined on the message space. So if a voting system belongs to homomorphic encryption model, we don t need to decrypt each of encrypted votes to find out the final result of voting process. Therefore, the plaintext of vote is never visible to anyone else except the voter himself. In other words, the protocol using this kind of technique can guarantee the privacy of individual votes while retaining the universal verifiability. There are many protocols based on this technique. In this paper we just introduce three main protocols. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.30

Benaloh protocol This is one of the earliest models using the special property of homomorphic cryptography suggested by Benaloh in [15]. In this model, the voters only cast the Boolean vote such as yes/no for technical reason. They will divide their votes into n parts to share them between n voting authorities so that (t+1) out of these voting authorities can recover it. Then, each voting authority computes its encrypted share of the final result. Lastly, at least (t+1) voting authorities cooperate with each other to recover the final result. The homomorphic encryption used in Benaloh protocol is E(x 1 ) * E(x 2 ) = E((x 1 + x 2 ) mod r) We have the public key is the modulus m and the base g with a block size of r, and the encryption of a message x is We can find out that E(x) = (g x * u r ) mod m E(x 1 ) * E(x 2 ) = (g x1 u 1 x1 ) * (g x2 u 2 x2 ) = g x1+x2 (u 1 u 2 ) r = E((x 1 + x 2 ) mod r) Cramer et al protocol The model of Benaloh is quite simple, but it has a high communication cost because each voter must cast his or her vote over n communication channels. Consequently, researchers found out another model which was optimal the communications between voters and voting authorities. In this model, the voters send their encrypted votes to a single combiner. Then, the combiner computes the encryption of final result by using the homomorphic property of cryptosystem. After that, the combiner forwards that result to the voting authorities and (t+1) out of them can recover the plain text of final result by using a threshold cryptosystem. More detailed information about threshold cryptosystem can be found in [13]. However, the encryption using in this model has a relatively high computational complexity when the number of candidates become large. If the number of voters is l, the number of candidates is r; the complexity is (l (r-1)/2 ) [7]. So researchers suggested another protocol which can decrease the computational complexity. Paillier protocol There are many protocols based on the cryptosystem of Paillier. This cryptosystem provides the more optimal decryption algorithm so it can decrease the complexity of computation process. The protocol of Paillier is the same as the protocol of Cramer model, but it uses another function to encrypt the private message. We have the public key is the modulus m and the base g with a block size of r, and the encryption of a message x is E(x) = (g x * r m ) mod m 2 The homomorphic property is E(x 1 ) * E(x 2 ) = (g x1 r 1 m ) (g x2 r 2 m ) = g x1 + x2 (r 1 r 2 ) m = E((x 1 + x 2 ) mod m) According to [8], the computational complexity of the protocol is linear in the size of Paillier modulus, and the number of candidates as well. That is (p x N ), p: number of candidates N: the size of the modulus used in the Paillier cryptosystem ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.31

The protocols based on homomorphic technique satisfied most requirements of privacy in voting context. However they are still inefficient for large scale elections because computational and communicational cost for the proof and verification of vote s validity is quite large when there are a lot of candidates. In addition, homomorphic encryption protocols cannot be employed on multi-choices voting forms because of the characteristic of homomorphism. Blind signature The idea of blind signature was first introduced by Chaum [17]. It stemmed from the need that a person wants to verify the valid of his document but doesn t want the verifier to know anything about its content. We can imagine the process of blind signature as followings: the Owner of a document needs an Authority (signer) to sign on his document in order to legitimize. However, the owner doesn t want the authority to gain any information from the data written in this document. Therefore, he deals with this problem by a trick that owner will put his document into an envelope (it is a tool to blind content of the document). He will also put a carbon-paper into it and then, sending it to the Authority. After receiving the envelope, the Authority will check the name of Owner at the outside; if the owner is valid user, the Authority will sign on the predefined area of the envelope without opening it, and sending it back to Owner. Finally, owner will have signature of authority without revealing any information written in his document. A simple method to implement blind signature scheme is using the asymmetric cryptosystem RSA. We have some notation m: the document needs to be signed. d: the private key of authority (signer) e, N: the public key of authority s: the signature of m. r: the random number that the owner s document chose, and satisfied gcd(r, N) = 1. The RSA blind signature scheme is implemented as followings Step 1: the owner blinds his document by the blind factor and then sends it to the authority m = mr e (mod N) Step 2: upon receiving m, the authority will compute a blinded signature s by using his private key d, then send it back to the owner s document. s (m ) d (mod N) Step 3: owner will un-blind to get the signature s when he receives s s s. r -1 (m ) d r -1 m d r ed r -1 m d rr -1 m d (mod N) However, this technique just helps to anonymize the identities of voters. In this case, the content of each vote will be threatened. If a voting protocol does not have any proper methods to protect the content of votes, the intermediate result of voting process will leak out; and it is easy for an adversary both inside and outside the system to modify or remove the vote to make to final result incorrect. There are many electronic voting protocols applying the blind signature technique such as [3][4][6][14]. In Fujioka protocol [14], the voter writes down his choice in the ballot, encrypting it and sending to voting authority to get the blind signature. The voter un-blinds the signature and sends both the encryption and the signature to a voting authority through anonymous channel. After casting phase, voter will check his own encrypted vote then send the decryption key to voting authority anonymously. This protocol protects the content of ballots against announcing the intermediate result. However, it allows voter to ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.32

show his vote to the vote-buyers. That makes the uncoercibility and receipt-freeness requirements violated. In summary, despite its weakness, there are many electronic voting protocols based on blind signature technique for its simple computational operators or small communicational cost. In order to fulfill the privacy of votes in the protocols based on blind signature, authors employ some supplementary techniques such as plaintext equality test in [19], recasting without scarifying uniqueness requirement in [4] Conclusion In this paper, we have introduced the concept of electronic voting, and the reason electronic voting is becoming the new tendency in modern life. We have also provided the analysis about privacy in the voting context and requirements to implement an electronic voting system in the future. In addition, a brief introduction of general architecture along with potential solutions to privacy preserving problem in electronic voting and assessments of the ability to satisfy privacy requirements in voting context and the computational complexity of each solution are presented as well. In the future, we intend to put forth the detailed architecture that aims to address the problem of coercion and vote-buying, and then create a more efficient protocol for internet voting. This protocol not only has a smaller computational complexity but also remains a higher level of privacy. References [1] O. Spycher, R. Koenig, R. haenni, and M. Schlapfer, A new approach towards coercion-resistant remote e-voting in linear time, in 15th International Conference on Financial Cryptography, St. Lucia, 2011. [2] S. Popoveniuc. A framework for secure mixnet-base electronic voting. Thesis (PhD), University of Geoger Washington, 2009. [3] O. Cetinkaya, and A. Doganaksoy, Pseudo-voter identity (PVID) scheme for e- voting protocols, in Proceedings of ARES 2007, pp. 1190 1196, 2007. [4] O. Cetinkaya, and A. Doganaksoy, A practical privacy preserving e-voting protocol using dynamic ballots, in 2 nd National Cryptology Symposium, Ankara, Turkey, 2006. [5] L. Coney, J.L. Hall, P.L. Vora, and D. Wagner, Towards a privacy measurement criterion for voting systems, in Proceedings of Digital Government Research, pp. 287-288, 2005. [6] H.T Liaw, A secure electronic voting protocol for general elections, Journal of Computer & Security, Vol. 23, pp. 107-119, 2003. [7] M. Brumester, and E. Magkos, "Towards secure and practical e-elections in the new era", in Secure Electronic Voting, D.A. Gritzalis, eds: Kluwer Academic Publishers, pp. 63-76, 2003. [8] O. Baudron, P.A. Fouque, D. Pointcheval, G. Poupard, and J. Stern. Practical multicandidate election system, in Proceedings of 20th ACM Symposium on Principles of Distributed Computing, ACM Press, pp. 274-283, 2001. [9] California secretary of state Bill Jones, A report on the feasibility of Internet Voting, 2000. [10] R. Cramer, R. Gennaro, and B. Schoenmakers, A secure and optimally efficient multi-authority election scheme, in Proceedings of Eurocrypt 97, LNCS 1233, Springer-Verlag, pp. 103-118, 1997. [11] W.S. Juang, and C.L. Lei, A secure and practical electronic voting scheme for real world environments, IEICE Trans. on Fundamentals, 1997. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.33

[12] K. Sako, and J. Killian, Receipt-free mix-type voting scheme, in Proceedings of EuroCrypt 95, LNCS 921, Springer-Verlag, pp. 393-403, 1995. [13] Y. Desmedt, Threshold cryptography, European Transactions on Telecommunications, pp. 449-457, 1994. [14] A. Fujioka, T. Okmoto, and K. Ohta, A practical secret voting scheme for large scale elections, in Proceedings of AUSCRYPT 92, LNCS 718, Springer-Verlag, pp. 244-251, 1993. [15] J. Benaloh. Verifiable Secret-Ballot Elections. Thesis (PhD), Yale University, 1987. [16] A.C. Yao, Protocols for secure computations, in Proceedings of the 23th Annual IEEE Symposium on Foundations of Computer science, 1982. [17] D. Chaum, Blind signatures for untraceable payments, in Proceedings of CRYPTO 82, Plenum Press, pp. 199-203, 1982. [18] D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, in Communications of the ACM, pp. 84-88, 1981. [19] A. Juels, D. Catalano, and M. Jackobsson. Coercion-resistant electronic elections, in Proceedings of ACM Workshop on Privacy in the Electronic Society, November 2005, USA, pp. 61-70, 2005. ASEAN Engineering Journal, Vol 3 No 1, ISSN 2229-127X, e-issn 2586-1959 p.34