Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 3075210, 16 pages
https://doi.org/10.1155/2017/3075210
Research Article

Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

1Department of Electrical Engineering, College of Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kweishan, Taoyuan, Taiwan
2Department of Nuclear Medicine, Linkou Chang Gung Memorial Hospital, Taoyuan, Taiwan
3Center for Biomedical Engineering, Chang Gung University, Taoyuan, Taiwan

Correspondence should be addressed to Shin-Yan Chiou; wt.ude.ugc.liam@lesna

Received 2 August 2017; Revised 18 October 2017; Accepted 31 October 2017; Published 24 December 2017

Academic Editor: Georgios Kambourakis

Copyright © 2017 Shin-Yan Chiou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server). We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.