scholarly journals Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3075
Author(s):  
Marino Tejedor-Romero ◽  
David Orden ◽  
Ivan Marsa-Maestre ◽  
Javier Junquera-Sanchez ◽  
Jose Manuel Gimenez-Guzman

A number of e-voting systems have been proposed in the last decades, attracting the interest of the research community. The challenge is far from being fully addressed, especially for remote systems. In this work, we propose DiverSEC, a distributed, remote e-voting system based on Shamir secret sharing, operations in Galois field and mixnets, which enables end-to-end vote verification. Parties participate as nodes in the network, protecting their interests and ensuring process integrity due to the conflicting interests. The threat model is very conservative, not letting even the most privileged actors to compromise votes privacy or integrity. Security in depth is implemented, overlapping different mechanisms to offer guarantees even in the most adverse operating conditions. The main contributions of the resulting system are our proposal for secret-sharing among the political parties, which guarantees that no party can compromise the integrity of the ballot without being detected and identified in real time, and the computational and architectural scalability of the proposal, which make it easy to implement.

2021 ◽  
Vol 52 (3) ◽  
pp. 675-684
Author(s):  
Johannes Krause

Despite the 2020 reform of Germany’s national parliament voting law, the debate about a robust voting system has not ended . Träger and Jacobs have convincingly shown that Naun­dorf’s suggestion to introduce a parallel voting system creates more problems than it solves, and thus more far-reaching approaches have to be considered . One way to stop the Bunde­stag from growing is to reject the two vote-system . Comparable to the system of Thuringia’s local elections, with open lists and three votes per voter, both the standard size of the Bun­destag can be safely adhered to and at the same time a personalized proportional represen­tation can be maintained . Among other advantages, the voters would have greater influence on the personalized composition of the Bundestag . In particular, reservations on the part of the political parties could stand in the way of such a sustainable solution to the ongoing problems with the German electoral system .


2018 ◽  
Vol 10 (4) ◽  
pp. 50-64 ◽  
Author(s):  
Nicolas K. Blanchard

This article explores how to build popular trust for voting systems that rely heavily on statistical tools, as they are generally counter-intuitive to the average citizen (and even to experts). By trying out the voting system in public and letting people tinker with it, a first level of familiarity can be achieved. Preliminary results from real-world experiments seem encouraging and point out the importance of psychological and sociological factors in election organization as well as the influence of user interface design. To go further, integration into a larger debating platform held by a national party could give first-hand experience to the majority of the people, and would progressively build trust as the political stakes grow higher. Finally, the authors look into how different e-democratic tools could interact in a mutually beneficial manner.


Author(s):  
Mariya A. Gusarova ◽  

Most of the existing public key cryptosystems are potentially vulnerable to cryptographic attacks as they rely on the problems of discrete logarithm and factorization of integers. There is now a need for algorithms that will resist attacks on quantum computers. The article describes the implementation of Shamir’s post-quantum secret sharing scheme using long arithmetic that can be applied in modern cryptographic modules. The implementation of the Pedersen – Shamir scheme is described, which allows preserving the property of the perfection of the Shamir scheme by introducing testability. The article presents graphs reflecting the influence of the verifiability property in the Shamir secret sharing scheme on the speed of its operation.


Kerntechnik ◽  
2015 ◽  
Vol 80 (2) ◽  
pp. 150-160 ◽  
Author(s):  
P. Thiyagarajan ◽  
Prasanth Kumar Thandra ◽  
J. Rajan ◽  
S. A. V. Satyamurthy ◽  
G. Aghila

2011 ◽  
pp. 259-268
Author(s):  
Svetozar Ciplic

In this paper an attempt has been made to present one of the most prominent contradictions of the contemporary parliamentarianism in states which have a proportional voting system. This contradiction stems from the three-fold relationship between: a voter, a member of parliament (MP) and a political party from whose electoral list the MP is elected. On the one hand, a person does not have the possibility to be elected in the parliament if acting independently, outside the political party and its party mechanisms and logistical capacities. On the other hand, after being appointed the parliamentary term as a result of the party's will, the person attains the freedom, through their free term of office, to distance themselves from their political party, and even to leave it and join another political option. The paper also shows that this phenomenon significantly affects and deforms the principle of citizens' sovereignty, given that it is the political parties which have the major impact on the voters' sovereign will expressed at the elections. .


2021 ◽  
Vol 2096 (1) ◽  
pp. 012008
Author(s):  
S V Belim ◽  
S Y Belim

Abstract In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.


Sign in / Sign up

Export Citation Format

Share Document