Identity-based threshold cryptography for electronic voting

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Electronic voting protocols are a reasonable alternative to conventional elections. Nevertheless, they are facing an evolution due to its requirements, especially the ones needed to provide full security considered to represent a democratic electronic vote. Different algorithms, based on public key schemes, have been proposed in the literature to meet these security requirements. We propose the use of threshold cryptography and bilinear pairings in order to provide the security requirements that an electronic voting protocol must meet, without requiring the entire infrastructure needed in a public key scheme. We make a comparative analysis of our proposal with other electronic voting protocols. It is based in their performance and the cryptographic primitives they use.

Original languageEnglish
Title of host publicationProceedings of the 8th WSEAS International Conference on Data Networks, Communications, Computers, DNCOCO '09
Pages135-141
Number of pages7
StatePublished - 2009
Event8th WSEAS International Conference on Data Networks, Communications, Computers, DNCOCO '09 - Baltimore, MD, United States
Duration: 7 Nov 20099 Nov 2009

Publication series

NameProceedings of the 8th WSEAS International Conference on Data Networks, Communications, Computers, DNCOCO '09

Conference

Conference8th WSEAS International Conference on Data Networks, Communications, Computers, DNCOCO '09
Country/TerritoryUnited States
CityBaltimore, MD
Period7/11/099/11/09

Keywords

  • Bilinear pairings
  • Blind signatures
  • Electronic voting protocols
  • Identity based cryptography
  • Public key cryptography
  • Security requirements
  • Threshold cryptography

Fingerprint

Dive into the research topics of 'Identity-based threshold cryptography for electronic voting'. Together they form a unique fingerprint.

Cite this