Internet voting protocols: An analysis of the cryptographic operations per phase

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Internet voting is a good option for Colombia thanks to the expansion of mobile technology throughout the country and the interest of the government to implement the e-voting. For this reason, we study the e-voting protocols to establish if any of them is suitable for Colombian elections. However, some of them imply a great number of cryptographic operations and therefore a great computational cost for the devices, which sometimes exceed their capacity. In this paper, we determine the number of cryptographic operations per phase of four e-voting protocols: one based on blind signatures (Li, Hwang and Lai protocol), one based on mix nets (Meng protocol), one based on homomorphic encryption (EVIV protocol) and one used in real electoral processes (I-Voting for Estonian Elections). Then, we analyze the changes in the number of operations when the number of voters, number of votes, number of authorities and number of candidates increase for small, medium and large elections. Finally, we establish the protocol that imply a less number of cryptographic operations and is suitable for big electoral processes, such as congress elections in Colombia.

Cite

CITATION STYLE

APA

Satizábal, C., & Páez, R. (2018). Internet voting protocols: An analysis of the cryptographic operations per phase. International Journal of Communication Networks and Information Security, 10(2), 305–322. https://doi.org/10.17762/ijcnis.v10i2.3112

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free