International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 9 | Issue 1 | Year 2019 | Article Id. IJCOT-V9I1P301 | DOI : https://doi.org/10.14445/22492593/IJCOT-V9I1P301

A Double-Registration Based Algorithm for Secure Elections


Yaser M. Asem

Citation :

Yaser M. Asem, "A Double-Registration Based Algorithm for Secure Elections," International Journal of Computer & Organization Trends (IJCOT), vol. 9, no. 1, pp. 1-8, 2019. Crossref, https://doi.org/10.14445/22492593/IJCOT-V9I1P301

Abstract

Fair and democratic elections can change our life to the better. However, paper based elections suffer from many security breaches and need to be fixed. This paper proposes a secure electronic voting scheme that uses biometric measures for voters` authentications. In the proposed scheme, voters have to register twice for voters` anonymity and in order to prevent ballot box stuffing by the voters` authenticator. The proposed method uses three voting entities in each stage for registration, authentication, and vote tallying. The security analysis for the proposed electronic voting method shows that the characteristics of the ideal e-voting scheme are satisfied in the proposed method except for verifiability.

Keywords

e-voting, electronic elections, privacy, secure elections, democracy.

References

[1] Alaguvel R., Gnanavel G. and Jagadhambal K., "Biometrics using electronic voting system with embedded security," International journal of advanced research in computer engineering & technology (IJARCET), ISSN: 2278 – 1323, Vol. 2, No. 3, 1065-1072, 2013.
[2] D. Demirel, R. Frankland and M. Volkamer, "Readiness of various e-voting systems for complex elections,"TechnischeUniverstität Darmstadt, Tech. Rep. TUD-CS-2011-0193, 1–14, 2011.
[3] Dill, D., R., Mercuri, P., Neumann, and D., Wallach (2003) Frequently asked questions about DRE voting system. [online]. Available:https://www.verifiedvoting.org/resources/voting-equipment
[4] Dixit, P.V., Phalke, S., Ubale, R., Gavali, A.B., Prajkta, S. and Aparna, S., "A Biometric-Secure E-Voting System for Election Process," International Journal of Advanced Engineering and Global Technology, ISSN No: 2309-4893, Vol. 3, Issue 3, 2015.
[5] Kelsey J., Regenscheid A., Moran T., Chaum D."Attacking Paper-Based E2E Voting Systems," In: Chaum D. et al. Towards Trustworthy Elections. Lecture Notes in Computer Science, vol 6000, pp. 370–387. Springer, Berlin, Heidelberg, 2010
[6] MagdiAmer and Hazem El-Gendy, "Towards a Fraud Prevention E-Voting System". International Journal of Advanced Computer Science and Applications (IJACSA), vol.4 No.4, 147-149, 2013.
[7] M.J. Moayed, A. Abdul Ghani & R. Mahmod, "A survey on Cryptography Algorithms in Security of Voting System Approaches," Proceedings of the International Conference on Computational Sciences and Its Applications(ICCSA), 190 – 200, 2008.
[8] Mona F M Mursi, Ghazy M R Assassa, Ahmed Abdelhafez and Kareem Abo M Samra, "On the Development of Electronic Voting: A Survey," International Journal of Computer Applications, Vol. 61 No. 16, 2013.
[9] Noha E. El-Sayad, Rabab Farouk Abdel-Kader and Mahmoud Ibraheem Marie, "Face Recognition as an Authentication Technique in Electronic Voting," International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4 No. 6, 2013.
[10] Purushothama B R & Alwyn R Pais, "Design and Implementation of Secure Internet Based Voting System with User Anonymity using Identity Based Encryption System," IEEE International Conference on Services Computing, 474 – 481, 2009.
[11] Qadah, G. Z. and Taha, R., "Electronic voting systems: Requirements, design, and Implementation," Computer Standards & Interfaces, Vol. 29 No. 3, 376–386, 2007.
[12] Rossler, T. G. (2012). "e-Voting A Survey and Introduction," Austria Secure Information Technology Center.-2004.Available:https://www.a-sit.at/pdfs/evoting_survey.pdf
[13] Sampigethaya K. and Poovendran R., "A framework and taxonomy for comparison of electronic voting schemes," Computers & Security, Vol. 25, No. 2, 137-153, 2006.
[14] S. Kumar and M. Singh, "Design a secure electronic voting system using fingerprint technique," International journal of computer science issues, Vol 10, issue 4, No 1, 2013.
[15] Thomas Bronack. "The problems with a paper based voting system," [online white paper]. Available: http://www.dcag.com/images/White_Paper_-_The_problems_with_a_paper_based_voting_system.pdf
[16] L. Rura et al., "Online Voting System Based on Image Steganography and Visual Cryptography," Journal of Computing and Information Technology, Vol. 25, No. 1, pp. 47–61, March 2017.
[17] Sid diquee et al., "A Scalable and Secure MANET for an i-Voting System," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8:3, pp. 1-17, , September, 2017.