Electronic Elections Based on Group Signatures

Lukas Malina, Jan Smrz, Jan Hajny


This work deals with electronic elections and votingsystems. The paper presents a secure electronic voting solutionfor small and medium groups of voters. The proposed solutionis based on modern cryptographic schemes such as ElGamalencryption and a group signature scheme that keeps user privacy,ballot authenticity and confidentiality. The solution offers a userrevocation that can be accomplished only by the cooperation oftwo system entities. The solution is experimentally implementedand tested and the performance results are measured. The resultsdemonstrate that the solution is practical and can be run onvarious devices such as PCs, laptops, smartphones, etc.

Full Text:



J. Budurushi and M. Volkamer, “Feasibility analysis of various electronic voting systems for complex elections,” in Conference for E-Democracy and Open Governement, 2014, p. 141.

Ü. Madise and T. Martens, “E-voting in estonia 2005. the first practice of country-wide binding internet voting in the world,” Electronic Voting, vol. 86, 2006.

L. Malina, J. Smrz, J. Hajny, and K. Vrba, “Secure electronic voting

based on group signatures,” in Telecommunications and Signal Process-

ing (TSP), 2015 38th International Conference on. IEEE, 2015, pp.


D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Communications of the ACM, vol. 24, no. 2, pp. 84–90, 1981.

B. Schoenmakers, “A simple publicly verifiable secret sharing scheme and its application to electronic voting,” in Advances in Cryptology-CRYPTO99. Springer, 1999, pp. 148–164.

B. L. K. Kim, “Receipt-free electronic voting through collaboration of voter and honest verifier,” 2000.

C. A. Neff, “A verifiable secret shuffle and its application to e- voting,” in Proceedings of the 8th ACM conference on Computer and Communications Security. ACM, 2001, pp. 116–125.

A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, ser. WPES ’05. New York, NY, USA: ACM, 2005, pp. 61–70. [Online]. Available: http://doi.acm.org/10.1145/1102199.1102213

M. Hirt and K. Sako, “Efficient receipt-free voting based on homomorphic encryption,” in Advances in CryptologyEUROCRYPT 2000. Springer, 2000, pp. 539–556.

I. Damgård, M. Jurik, and J. B. Nielsen, “A generalization of pailliers public-key system with applications to electronic voting,” International Journal of Information Security, vol. 9, no. 6, pp. 371–385, 2010.

C.-L. Chen, Y.-Y. Chen, J.-K. Jan, and C.-C. Chen, “A secure anonymous e-voting system based on discrete logarithm problem,” Appl. Math, vol. 8, no. 5, pp. 2571–2578, 2014.

D. G. Nair, V. P. Binu, and G. Santhosh Kumar, “An improved e-voting scheme using secret sharing based secure multi-party computation,” 2014.

N. Braun and D. Brändli, “Swiss e-voting pilot projects: Evaluation, situation analysis and how to proceed.” Electronic Voting, vol. 86, pp. 27–36, 2006.

D. Chaum, P. Y. Ryan, and S. Schneider, A practical voter-verifiable election scheme. Springer, 2005.

J. Helbach, J. Schwenk, and S. Schäge, “Code voting with linkable group signatures,” in Electronic Voting, 2008, pp. 209–208.

S. Kremer, M. Ryan, and B. Smyth, Election verifiability in electronic voting protocols. Springer, 2010.

E. Cuvelier, O. Pereira, and T. Peters, “Election verifiability or ballot privacy: Do we need to choose?” in Computer Security–ESORICS 2013. Springer, 2013, pp. 481–498.

L. Malina, A. Vives-Guasch, J. Castellà-Roca, A. Viejo, and J. Hajny, “Efficient group signatures for privacy-preserving vehicular networks,” Telecommunication Systems, pp. 1–19, 2014.

D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology–CRYPTO 2004. Springer, 2004, pp. 41–55.

L. Malina and J. Hajny, “Efficient security solution for privacy-preserving cloud services,” in Telecommunications and Signal Processing (TSP), 2013 36th International Conference on. IEEE, 2013, pp.


L. Malina, J. Hajny, and V. Zeman, “Usability of pairing-based cryptography on smartphones,” in Telecommunications and Signal Processing (TSP), 2015 38th International Conference on. IEEE, 2015, pp. 617–621.

A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen, “Practical short signature batch verification,” in Topics in Cryptology–CT-RSA 2009. Springer, 2009, pp. 309–324.

L. Malina, J. Hajny, and V. Zeman, “Trade-off between signature aggregation and batch verification,” in Telecommunications and Signal Processing (TSP), 2013 36th International Conference on. IEEE, 2013, pp. 57–61.

DOI: http://dx.doi.org/10.11601/ijates.v5i1.130


  • There are currently no refbacks.