2004
DOI: 10.11610/isij.1512
|View full text |Cite
|
Sign up to set email alerts
|

Improved Anonymous Secure e-Voting over a Network

Abstract: In a democratic country voting is one of the most important activities. However, many eligible voters do not exercise their right simply because they do not want to visit a public booth where they can vote. In 1981, David Chaum first introduced the concept of electronic voting and attempted to overcome the problems associated with the traditional voting environment. Hereafter, Mu and Varadharajan proposed in 1998 an anonymous secure e-voting scheme over a network. They claimed that the proposed scheme is not o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…There are some e-voting protocols in the literature which use neither anonymous channels nor homomorphic encryption in order to perform e-voting over a network [15], [16], [17]. These protocols suffer from accuracy as corrupted participants can make fraud without being detected.…”
Section: Related Workmentioning
confidence: 99%
“…There are some e-voting protocols in the literature which use neither anonymous channels nor homomorphic encryption in order to perform e-voting over a network [15], [16], [17]. These protocols suffer from accuracy as corrupted participants can make fraud without being detected.…”
Section: Related Workmentioning
confidence: 99%
“…Yang et al proposed in [3] another modification to the scheme proposed by Mu and Varadharajan. That scheme resists the attacks reported in [1,15,2].…”
Section: Related Workmentioning
confidence: 99%
“…The main contribution presented in this paper is to show that all variations of the Mu and Varadharajan [12] e-voting scheme that have been proposed so far, namely, the Lin et al [1], Hwang et al [2] and Yang et al [3] schemes, share a functional flaw: a high possibility of not being able to sign the voting content m. Moreover, we show that this difficulty arises from the way that all those schemes use the ElGamal digital signature algorithm. Furthermore, we propose a new modification to these schemes which allows overcoming the security flaw we found effectively.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Their proposed scheme does not require any special voting channel and it is claimed that the scheme is able to detect vote duplicity effectively. Yang et al (2004) proposed another improvement on Mu and Varadharajan's protocol. Although their scheme is resistant to the attacks which has been proposed in Chien et al (2003), it can not determine the identity of double voter.…”
Section: Introductionmentioning
confidence: 99%