Strengthening the Authentication Mechanism of Blockchain-Based E-Voting System Using Post-Quantum Cryptography
DOI:
https://doi.org/10.15575/join.v9i2.1305Keywords:
Anonymous ID, Goldreich-Goldwasser-Halevi, Impersonation Attack, Man-in-the-middle Attack, Signature Scheme, Voter AnonymityAbstract
References
[1] A. Benabdallah, A. Audras, L. Coudert, N. El Madhoun, and M. Badra, “Analysis of Blockchain Solutions for E-Voting: A Systematic Literature Review,” IEEE Access, vol. 10, pp. 70746–70759, 2022, doi: 10.1109/ACCESS.2022.3187688.
[2] M. Sallal, R. de Fréin, and A. Malik, “PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain,” Future Internet, vol. 15, no. 4, p. 121, Mar. 2023, doi: 10.3390/fi15040121.
[3] R. Taş and Ö. Ö. Tanrıöver, “A Systematic Review of Challenges and Opportunities of Blockchain for E-Voting,” Symmetry (Basel), vol. 12, no. 8, p. 1328, Aug. 2020, doi: 10.3390/sym12081328.
[4] R. AlAbri, A. K. Shaikh, S. Ali, and A. H. Al-Badi, “Designing an E-Voting Framework Using Blockchain Technology,” International Journal of Electronic Government Research, vol. 18, no. 2, pp. 1–29, Mar. 2022, doi: 10.4018/IJEGR.298203.
[5] M. J. Beck and D. A. Hensher, “Insights into the impact of COVID-19 on household travel and activities in Australia – The early days under restrictions,” Transp Policy (Oxf), vol. 96, pp. 76–93, Sep. 2020, doi: 10.1016/j.tranpol.2020.07.001.
[6] P. Y. A. Ryan, S. Schneider, and V. Teague, “End-to-End Verifiability in Voting Systems, from Theory to Practice,” IEEE Secur Priv, vol. 13, no. 3, pp. 59–62, May 2015, doi: 10.1109/MSP.2015.54.
[7] F. Casino, T. K. Dasaklis, and C. Patsakis, “A systematic literature review of blockchain-based applications: Current status, classification and open issues,” Telematics and Informatics, vol. 36, pp. 55–81, Mar. 2019, doi: 10.1016/j.tele.2018.11.006.
[8] Prof. Amree Khan, Jayesh Bhaisare, Kajal Chandekar, and Aditi Lichade, “Online Voting and Information Management,” International Journal of Advanced Research in Science, Communication and Technology, pp. 514–517, Dec. 2022, doi: 10.48175/IJARSCT-7717.
[9] S. Park, M. Specter, N. Narula, and R. L. Rivest, “Going from bad to worse: from Internet voting to blockchain voting,” J Cybersecur, vol. 7, no. 1, Feb. 2021, doi: 10.1093/cybsec/tyaa025.
[10] R. Krimmer, D. Duenas-Cid, and I. Krivonosova, “New methodology for calculating cost-efficiency of different ways of voting: is internet voting cheaper?,” Public Money & Management, vol. 41, no. 1, pp. 17–26, Jan. 2021, doi: 10.1080/09540962.2020.1732027.
[11] D. Duenas-Cid, I. Krivonosova, R. Serrano, M. Freire, and R. Krimmer, “Tripped at the Finishing Line: The Åland Islands Internet Voting Project,” 2020, pp. 36–49. doi: 10.1007/978-3-030-60347-2_3.
[12] C. H. Roh and I. Y. Lee, “A study on electronic voting system using private blockchain,” Journal of Information Processing Systems, vol. 16, no. 2, pp. 421–434, Apr. 2020, doi: 10.3745/JIPS.03.0135.
[13] P. Baudier, G. Kondrateva, C. Ammi, and E. Seulliet, “Peace engineering: The contribution of blockchain systems to the e-voting process,” Technol Forecast Soc Change, vol. 162, p. 120397, Jan. 2021, doi: 10.1016/j.techfore.2020.120397.
[14] K. M. Khan, J. Arshad, and M. M. Khan, “Investigating performance constraints for blockchain based secure e-voting system,” Future Generation Computer Systems, vol. 105, pp. 13–26, Apr. 2020, doi: 10.1016/j.future.2019.11.005.
[15] H.-T. Wu and C.-Y. Yang, “A Blockchain-Based Network Security Mechanism for Voting Systems,” in 2018 1st International Cognitive Cities Conference (IC3), IEEE, Aug. 2018, pp. 227–230. doi: 10.1109/IC3.2018.00-15.
[16] Q. K. Kadhim, B. M. Al-Nedawe, and E. M. Hameed, “Encryption and Decryption of Images using GGH Algorithm: Proposed,” IOP Conf Ser Mater Sci Eng, vol. 1090, no. 1, p. 012063, Mar. 2021, doi: 10.1088/1757-899X/1090/1/012063.
[17] O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, New York, NY, USA: ACM, May 2005, pp. 84–93. doi: 10.1145/1060590.1060603.
[18] A. Sipasseuth, T. Plantard, and W. Susilo, “Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices,” Journal of Mathematical Cryptology, vol. 13, no. 3–4, pp. 169–196, Sep. 2019, doi: 10.1515/jmc-2016-0066.
[19] M. Belkasmi, F. El Bouanani, Institute of Electrical and Electronics Engineers. Morocco Section., and Institute of Electrical and Electronics Engineers, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS’16) : proceedings : October 17-19, 2016, Marrakesh, Morocco.
[20] L. Babai, “On Lovász’ lattice reduction and the nearest lattice point problem,” Combinatorica, vol. 6, no. 1, pp. 1–13, Mar. 1986, doi: 10.1007/BF02579403.
[21] T. Plantard, W. Susilo, and K. T. Win, “A Digital Signature Scheme Based on CVP ∞ ,” in Public Key Cryptography – PKC 2008, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 288–307. doi: 10.1007/978-3-540-78440-1_17.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2024 Sonitema Laia, Ari Moesriami Barmawi
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License