Hussien 2013
Hussien 2013
Abstract—E-voting systems are becoming popular with the security is illustrated in section V. Section VI concludes the
widespread use of computers and embedded systems. Security is paper.
the vital issue should be considered in such systems. This paper
proposes a new e-voting system that fulfills the security II. ELECTRONIC VOTING SECURITY REQUIREMENTS
requirements of e-voting. It is based on homomorphic property
and blind signature scheme. The proposed system is implemented
Security and accuracy are the first and foremost
on an embedded system which serves as a voting machine. The requirements for any voting system. Hence, EVS should satisfy
system employes RFID to store all conditions that comply with at least the following security requirements which are
the rule of the government to check voter eligibility. described in [4, 5, 6, 7]:
• Eligibility: only authorized voters who satisfy pre-
Keywords-component; E-voting system, Paillier cryptosystem,
determined criterion can vote.
RFID, blind signature, embedded system, security.
• Uniqueness: no one can vote more than once.
I. INTRODUCTION • Privacy: a vote is kept secret and no one can determine
One of the fundamental mechanisms for democracy is for whom anyone else voted,
election. It is the way to collect the public opinions to form a
democratic government. The traditional process of election is • Integrity: election process is secure so no one can
quite tedious, time consuming and has a cumbersome change anyone else’s vote without being discovered. In
procedure in preparation and tallying phases. To overcome addition no one can duplicate anyone else’s vote.
these difficulties electronic voting system (EVS) is introduced. • Accuracy: every voter can make sure that his vote has
EVS continues to grow as long as the world becomes more been taken into account in the final tabulation.
dependable on the new technologies. EVS provides a lot of
benefits than traditional voting systems. It tries to enable To achieve the above security services many security
efficient and secure elections. EVS is inexpensive because its schemes are provided. These schemes can be classified into [2,
resources are reusable. Also it does not require any 8]
geographical proximity of voters, and it provides better
• Cryptography system and blind signature which used
scalability for large elections [1]. Meanwhile using EVS must for encrypting ballot and printing encrypted receipt.
satisfy some security requirements such as authentication, voter [9,10,11],
privacy, confidentiality, integrity, etc. Many security flaws
were found because EVS is more vulnerable than traditional • Mix-net based scheme for encrypting receipts which
voting process [2]. Digital data processing allows any are one part of ballot [ 12,13, 14],
manipulation, updating or copying in votes. Hence this results
in a widespread fraud during the election day. Thus many • Using a Homomorphic method for hiding voter
professionals expressed their negative opinions on e-voting [3]. information and ballot content [15, 16, 17].
Nevertheless, efforts are still made to introduce EVS in
countries that use traditional paper ballots [3]. III. SIGNIFICANT SECURITY TOOLS
The primary needs in any EVS are the confidence of voters The cryptographic voting protocols are based on significant
that their votes are counted and the final tally is sum of all security tools. These tools are classified to
correct votes. For this reason, many different methods were • Homomorphic encryption.
proposed concerning the security of EVS [1, 2].
• Mix-net.
This paper introduces a new EVS employs the • Blind signature based on RSA.
homomorphic property and blind signature based on RSA.
The paper is organized as follows; the essential EVS security The following subsections describe briefly these tools
requirements are described in section II. Section III explains
the significant security tools. The details of proposed e-voting A. Homomorphic Cryptosystem
system and its different phases are detailed in section IV. Homomorphic cryptosystem is one of the efficient security
Analysis of the proposed system from the point of view of tools for e-voting system due to homomorphic property [18].
The security of the RFID and its communication are beyond Name of storage field in RFID Size (bits)
the scope of this paper. Presidential election 17
Criminal status 1 have another prime number that represents vote NO as shown
in table II. For a real time processing the number of rows M
Armed forces 1
(ballots) is chosen to be small for example 5 rows or multiple
Quarintied status 1 of 5. The voting terminal encrypts each prime number in the
ballot (row) using Paillier cryptosystem. Afterward the
Mental illness 1
encrypted ballot is concatenated with a corresponding voter’s
Bankruptcy 1 information. The resulting tables are sent to the local
committee. Based on the additive homomorphic property of
Status of requirement 1
Paillier cryptosystem the voting terminal multiplies all
encrypted votes for each nominee (column) as shown in table
III. To prohibit any attempts to vote again, the RFID writer where,
records the election date and set the flag in type of election n is the number of “Vote Yes” for each nominee.
field in voter’s RFID to logic one. All these steps are repeated y is the decryption result of each nominee.
for the remaining ballots until the end of the Election Day. r2 is the prime number representing “Vote No.”
r1 is the prime number representing “Vote Yes”.
TABLE II. TABLE 5×5 OF PLAIN BALLOTS PRIME NO. OF VOTE YES = 5 N is the total number of ballots delivered to CTF
AND FOR VOTE NO =19
David Jon Carl Arlond Tom For the above example, if it is required to find the number of
“Vote Yes” for nominee 3, assuming that N = M = 5
Voter1 5 19 19 19 19