Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 3075210, 16 pages
https://doi.org/10.1155/2017/3075210
Research Article

Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

1Department of Electrical Engineering, College of Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kweishan, Taoyuan, Taiwan
2Department of Nuclear Medicine, Linkou Chang Gung Memorial Hospital, Taoyuan, Taiwan
3Center for Biomedical Engineering, Chang Gung University, Taoyuan, Taiwan

Correspondence should be addressed to Shin-Yan Chiou; wt.ude.ugc.liam@lesna

Received 2 August 2017; Revised 18 October 2017; Accepted 31 October 2017; Published 24 December 2017

Academic Editor: Georgios Kambourakis

Copyright © 2017 Shin-Yan Chiou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Modic, R. Trapero, A. Taha, J. Luna, M. Stopar, and N. Suri, “Novel efficient techniques for real-time cloud security assessment,” Computers & Security, vol. 62, pp. 1–18, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. A. V. Uzunov, “A survey of security solutions for distributed publish/subscribe systems,” Computers & Security, vol. 61, pp. 94–129, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. A. V. Uzunov, E. B. Fernandez, and K. Falkner, “Security solution frames and security patterns for authorization in distributed, collaborative systems,” Computers & Security, vol. 55, pp. 193–234, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. De Santis, “Modeling energy-efficient secure communications in multi-mode wireless mobile devices,” Journal of Computer and System Sciences, vol. 81, no. 8, pp. 1464–1478, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. T. Li, Z. Liu, J. Li, C. Jia, and K.-C. Li, “CDPS: a cryptographic data publishing system,” Journal of Computer and System Sciences, vol. 89, pp. 80–91, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  6. Q. Shi, N. Zhang, and M. Merabti, “Fair signature exchange via delegation on ubiquitous networks,” Journal of Computer and System Sciences, vol. 81, no. 4, pp. 615–631, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. D. Chaum, “Blind signatures for untraceable payments,” Crypto, vol. 82, 1983. View at Publisher · View at Google Scholar
  8. S. K. Nayak, B. Majhi, and S. Mohanty, “An ECDLP based untraceable blind signature scheme,” in Proceedings of the Circuits, Power and Computing Technologies (ICCPCT), International Conference on. IEEE, pp. 829–834, India, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. M. O. Rabin, “How to exchange secrets by oblivious transfer,” IACR Cryptology ePrint Archive, vol. 2005, p. 187, 2005. View at Google Scholar
  10. L. Chen, “Oblivious signatures,” in Computer Security–ESORICS 94, Lecture Notes in Computer Science 875, vol. 875 of Lecture Notes in Computer Science, pp. 161–172, Springer Berlin Heidelberg, Berlin, Heidelberg, 1994. View at Publisher · View at Google Scholar
  11. R. Tso, T. Okamoto, and E. Okamoto, “1-out-of-n oblivious signatures,” Information Security Practice and Experience, vol. 4991, pp. 45–55, 2008, Springer Berlin Heidelberg. View at Publisher · View at Google Scholar · View at MathSciNet
  12. J.-S. Chou, “A novel k-out-of-n oblivious transfer protocol from bilinear pairing,” Advances in Multimedia, vol. 2012, Article ID 630610, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E79-A, no. 9, pp. 1338–1353, 1996. View at Google Scholar · View at Scopus
  14. B. T. Lau, “Proxy signature schemes,” in Proceedings of the 2006 1st IEEE Conference on Industrial Electronics and Applications, ICIEA 2006, Singapore, May 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Wang and R. Yan, “A code-based multiple grade proxy signature scheme,” in Proceedings of the 2013 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, pp. 559–562, France, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. W. D. Lin and J. K. Jan, “A security personal learning tools using a proxy blind signature scheme,” in Proceedings of the Intl Conference on Chinese Language Computing, pp. 273–277, 2000.
  17. A. Z. Tan, Z. Liu, and C. Tang, “Digital proxy blind signature schemes based on DLP and ECDLP,” MM Research Preprints, vol. 21, no. 7, pp. 212–217, 2002. View at Google Scholar
  18. S. Lal and A. K. Awasthi, “Proxy Blind Signature Scheme,” Journal of Information Science and Engineering, vol. 72, 2003. View at Google Scholar
  19. F.-Y. Yang and L.-R. Liang, “A proxy partially blind signature scheme with proxy revocation,” Journal of Ambient Intelligence and Humanized Computing, vol. 4, no. 2, pp. 255–263, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. I. Ray and N. Narasimhamurthi, “An anonymous electronic voting protocol for voting over the internet,” Advanced Issues of E-Commerce and Web-Based Information Systems, Third International Workshop on IEEE, pp. 188–190, 2001. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Pan, E. Hou, and N. Ansari, “RE-NOTE: An E-voting scheme based on ring signature and clash attack protection,” in Proceedings of the 2013 IEEE Global Communications Conference, GLOBECOM 2013, pp. 867–871, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Zwattendorfer, C. Hillebold, and P. Teufl, “Secure and privacy-preserving proxy voting system,” in Proceedings of the 2013 IEEE 10th International Conference on e-Business Engineering, ICEBE 2013, pp. 472–477, UK, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Kardaş, M. S. Kiraz, M. A. Bingöl, and F. Birinci, “Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude,” Security and Communication Networks, vol. 9, no. 18, pp. 5051–5063, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. O. Kulyk, S. Neumann, K. Marky, J. Budurushi, and M. Volkamer, “Coercion-resistant proxy voting,” in Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection, vol. 471, pp. 3–16, IFIP SEC, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. O. Kulyk, K. Marky, S. Neumann, and M. Volkamer, “Introducing proxy voting to Helios,” in Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), pp. 98–106, Austria, September 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. B. Adida, “Helios: Web-based open-audit voting,” USENIX Security Symposium, vol. 17, pp. 335–348, 2008. View at Google Scholar
  27. G. Cohensius, S. Mannor, R. Meir, E. Meirom, and A. Orda, “Voting for better outcomes,” in Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pp. 858–866, São Paulo, Brazil, 2017.
  28. C. P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol. 4, no. 3, pp. 161–174, 1991. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols,” in Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73, November 1993. View at Scopus
  30. C. Shin-Yan, W. Tsung-Ju, and C. Jiun-Ming, “1-out-of-n Proxy Oblivious Signature Schemes and its e-voting application,” in Proceedings of the International Conference on Electronics Systems and Information Technology (ICESIT-15), pp. 10–14, 2015.
  31. E. Aljarrah, H. Elrehail, and B. Aababneh, “E-voting in Jordan: Assessing readiness and developing a system,” Computers in Human Behavior, vol. 63, pp. 860–867, 2016. View at Publisher · View at Google Scholar · View at Scopus
  32. D. A. López García, “A flexible e-voting scheme for debate tools,” Computers & Security, vol. 56, pp. 50–62, 2016. View at Publisher · View at Google Scholar · View at Scopus
  33. K. Vassil, M. Solvak, P. Vinkel, A. H. Trechsel, and R. M. Alvarez, “The diffusion of internet voting. Usage patterns of internet voting in Estonia between 2005 and 2015,” Government Information Quarterly, vol. 33, no. 3, pp. 453–459, 2016. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Dossogne and L. Frédéric, “Blinded additively homomorphic encryption schemes for self-tallying voting,” Journal of Information Security and Applications, vol. 22, pp. 40–53, 2015. View at Google Scholar
  35. N. András, A. Márta, and S. Péter, “Could on-line voting boost desire to vote? – Technology acceptance perceptions of young Hungarian citizens,” Government Information Quarterly, vol. 33, no. 4, pp. 705–714, 2016. View at Publisher · View at Google Scholar · View at Scopus
  36. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 10–18, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  37. S.-Y. Chiou, Z. Ying, and J. Liu, “Improvement of a privacy authentication scheme based on cloud for medical environment,” Journal of Medical Systems, vol. 40, no. 4, article no. 101, pp. 1–15, 2016. View at Publisher · View at Google Scholar · View at Scopus
  38. S.-Y. Chiou, “Common friends discovery for multiple parties with friendship ownership and replay-attack resistance in mobile social networks,” Wireless Networks, pp. 1–15, 2016. View at Publisher · View at Google Scholar · View at Scopus
  39. R. Anane, R. Freeland, and G. Theodoropoulos, “E-voting requirements and implementation,” in Proceedings of the 9th IEEE International Conference on E-Commerce Technology; The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services, CEC/EEE 2007, pp. 382–389, Japan, July 2007. View at Publisher · View at Google Scholar · View at Scopus