A design of secure preferential E-voting

7Citations
Citations of this article
287Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A secure preferential e-voting scheme is designed in this paper. It is a homomorphic e-voting scheme. It is illustrated that although mix-based voting is a very simple solution to preferential e-voting it is vulnerable to a coercion attack. The coercion attack especially attacks preferential e-voting scheme only outputs the election result and does not reveal any vote, so is invulnerable to the attack. Homomorphism of the employed encryption algorithm is exploited not only to count the votes without revealing them but also to adjust the votes when a new round of counting is needed. Moreover, it achieves all the security properties usually desired in e-voting. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Peng, K., & Bao, F. (2009). A design of secure preferential E-voting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5767 LNCS, pp. 141–156). https://doi.org/10.1007/978-3-642-04135-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free