A Double-Registration Based Algorithm for Secure Elections

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2019 by IJCOT Journal
Volume - 9 Issue - 1
Year of Publication : 2019
Authors :  Yaser M. Asem
DOI : 10.14445/22492593/IJCOT-V9I1P301

Citation

MLA Style:Yaser M. Asem "A Double-Registration Based Algorithm for Secure Elections" International Journal of Computer and Organization Trends 9.1 (2019): 1-8.

APA Style:Yaser M. Asem (2019). A Double-Registration Based Algorithm for Secure Elections. International Journal of Computer and Organization Trends, 9(1), 1-8.

Abstract

Fair and democratic elections can change our life to the better. However, paper based elections suffer from many security breaches and need to be fixed. This paper proposes a secure electronic voting scheme that uses biometric measures for voters` authentications. In the proposed scheme, voters have to register twice for voters` anonymity and in order to prevent ballot box stuffing by the voters` authenticator. The proposed method uses three voting entities in each stage for registration, authentication, and vote tallying. The security analysis for the proposed electronic voting method shows that the characteristics of the ideal e-voting scheme are satisfied in the proposed method except for verifiability.

References

[1] Alaguvel R., Gnanavel G. and Jagadhambal K., "Biometrics using electronic voting system with embedded security," International journal of advanced research in computer engineering & technology (IJARCET), ISSN: 2278 – 1323, Vol. 2, No. 3, 1065-1072, 2013.
[2] D. Demirel, R. Frankland and M. Volkamer, "Readiness of various e-voting systems for complex elections,"TechnischeUniverstität Darmstadt, Tech. Rep. TUD-CS-2011-0193, 1–14, 2011.
[3] Dill, D., R., Mercuri, P., Neumann, and D., Wallach (2003) Frequently asked questions about DRE voting system. [online]. Available:https://www.verifiedvoting.org/resources/voting-equipment
[4] Dixit, P.V., Phalke, S., Ubale, R., Gavali, A.B., Prajkta, S. and Aparna, S., "A Biometric-Secure E-Voting System for Election Process," International Journal of Advanced Engineering and Global Technology, ISSN No: 2309-4893, Vol. 3, Issue 3, 2015.
[5] Kelsey J., Regenscheid A., Moran T., Chaum D."Attacking Paper-Based E2E Voting Systems," In: Chaum D. et al. Towards Trustworthy Elections. Lecture Notes in Computer Science, vol 6000, pp. 370–387. Springer, Berlin, Heidelberg, 2010
[6] MagdiAmer and Hazem El-Gendy, "Towards a Fraud Prevention E-Voting System". International Journal of Advanced Computer Science and Applications (IJACSA), vol.4 No.4, 147-149, 2013.
[7] M.J. Moayed, A. Abdul Ghani & R. Mahmod, "A survey on Cryptography Algorithms in Security of Voting System Approaches," Proceedings of the International Conference on Computational Sciences and Its Applications(ICCSA), 190 – 200, 2008.
[8] Mona F M Mursi, Ghazy M R Assassa, Ahmed Abdelhafez and Kareem Abo M Samra, "On the Development of Electronic Voting: A Survey," International Journal of Computer Applications, Vol. 61 No. 16, 2013.
[9] Noha E. El-Sayad, Rabab Farouk Abdel-Kader and Mahmoud Ibraheem Marie, "Face Recognition as an Authentication Technique in Electronic Voting," International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4 No. 6, 2013.
[10] Purushothama B R & Alwyn R Pais, "Design and Implementation of Secure Internet Based Voting System with User Anonymity using Identity Based Encryption System," IEEE International Conference on Services Computing, 474 – 481, 2009.
[11] Qadah, G. Z. and Taha, R., "Electronic voting systems: Requirements, design, and Implementation," Computer Standards & Interfaces, Vol. 29 No. 3, 376–386, 2007.
[12] Rossler, T. G. (2012). "e-Voting A Survey and Introduction," Austria Secure Information Technology Center.-2004.Available:https://www.a-sit.at/pdfs/evoting_survey.pdf
[13] Sampigethaya K. and Poovendran R., "A framework and taxonomy for comparison of electronic voting schemes," Computers & Security, Vol. 25, No. 2, 137-153, 2006.
[14] S. Kumar and M. Singh, "Design a secure electronic voting system using fingerprint technique," International journal of computer science issues, Vol 10, issue 4, No 1, 2013.
[15] Thomas Bronack. "The problems with a paper based voting system," [online white paper]. Available: http://www.dcag.com/images/White_Paper_-_The_problems_with_a_paper_based_voting_system.pdf
[16] L. Rura et al., "Online Voting System Based on Image Steganography and Visual Cryptography," Journal of Computing and Information Technology, Vol. 25, No. 1, pp. 47–61, March 2017.
[17] Sid diquee et al., "A Scalable and Secure MANET for an i-Voting System," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8:3, pp. 1-17, , September, 2017.

Keywords
e-voting, electronic elections, privacy, secure elections, democracy.