Incoercible secure electronic voting scheme using chaffing and winnowing

Loading...
Thumbnail Image
Date
2002-08
Authors
Chin Kiong, Ng
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Traditional paper ballot election is facing multitude of problems, good examples are the controversial behind United State Presidential Election 2000 and Malaysia local byelections at Pendang and Lunas. These focus the public attention on the need to combat voting fraud while ensuring that no qualified voters are disenfranchised and the need for an accurate counting" of votes. Simple point-and-click electronic elections or Internet elections may seem an attractive 21st Century alternative to traditional paper voting systems, in view of the growing usage of personal computer and the Internet. Since the preliminary proposal o f electronic voting scheme by D avid C haum, researchers have proposed many schemes. However, among the -security requirements few are still unsatisfactory, coercion fraud being one of those remains unsolved, at least not without some fotrn of physical assumptions. This thesis bring forth an incoercible electronic voting scheme based on blind signature and mix -type anonymous channel, which is autonomous of any physical a ssurnption. a.Ild at the s~e_ time does not strain the by now ~?mple_x voti~g scheme. Oll.f solution utilizes the combination of symmetric encryption and Rivest's steganography technique -chaffing and winnowing (C&W). In contrast to encryption, steganography employing message digest that consumes much less computation power, space and time; similar case for symmetric encryption compare to asymmetric encryption, which is an added advantage consider the amount of voter-generated traffics. Using C&W, voters could present the ·coercer with fake encryption keys that produce different voting strategies. Thus, the c oercer would not convince oft he ballot presented and could not act with certainty of success, consequently vote buying and extortion is resolved without sacrificing other security requirements.
Description
Keywords
Secure electronic voting , Using chaffing , Winnowing
Citation