Document Type : Research Paper

Authors

College of Computer Science and IT, University of Anbar, Ramadi, Iraq

Abstract

This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level of security that can be very beneficial for some significant e-voting tasks. Moreover, a framework for the integration of the QKD with the e-voting system is proposed. The Helios voting system, which is considered as one of the open-source and major voting systems, has been chosen for this integration. Investigation of the main design aspects of building a QKD-based e-voting system has been done. Thus, the expected advantages and limitations of the proposal are discussed and analyzed.
 

 

Keywords

Main Subjects

[1] Zagórski F., Carback R., Chaum D., Clark J., Essex A., and Vora P., 2013, "Remotegrity: Design and use of an end-to-end verifiable remote voting system," International Conference on Applied Cryptography and Network Security, 441-457.
[2] Kaczmarek T., Wittrock J., Carback R., Florescu A., Rubio J., Runyan N., et al., 2013, "Dispute resolution in accessible voting systems: The design and use of audiotegrity," International Conference on E-Voting and Identity, pp. 127-141.
[3] Cortier V., Drăgan C., Dupressoir F., Schmidt B., Strub P., and Warinschi B., 2017, "Machine-checked proofs of privacy for electronic voting protocols," IEEE Symposium on Security and Privacy (SP), 993-1008.
[4] Ahmed M., and Abo-Rizka M., 2013, "Remote Internet voting: security and performance issues," World Congress on Internet Security (WorldCIS-2013), 56-64.
[5] Al-Janabi S., and Abid N., 2019, "Security of Internet Voting Schemes: A Survey," Revista AUS Journal, Special Issue 26-2, 260-270.
[6] Naidu P., and Kharat R., 2016, "Multi-factor authentication using recursive xor-based visual cryptography in online voting system," International Symposium on Security in Computing and Communication, 52-62.
[7] Imbar R, and Tirta E., 2007, "Analysis, Design and Implementation of Lubricant Sales Information Systems Case Study: Company PT Pro Roll International”, Jurnal Informatika, 3, 119-149.
[8] Adida B., 2008, "Helios: Web-based Open-Audit Voting," USENIX Security Symposium, 335-348.
[9] Pereira O., 2016, "Internet voting with Helios," Real-World Electronic Voting: Design, Analysis and Deployment, 8604.
[10] Karayumak F., Kauer M., Olembo M., Volk T., and Volkamer M., 2011, "User study of the improved Helios voting system interfaces," 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), 37-44.
[11] Bernhard D., Cortier V., Pereira O., Smyth B., and Warinschi B., 2011, "Adapting Helios for provable ballot privacy," in European Symposium on Research in Computer Security, 335-354.
[12] Cortier V., Galindo D., Glondu S., and Izabachene M., 2013, "Distributed elgamal á la pedersen: application to helios," in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, 131-142.
[13] Cortier V., Galindo D., Glondu S., and Izabachene M., 2014, "Election verifiability for helios under weaker trust assumptions," in European Symposium on Research in Computer Security, 327-344.
[14] Kulyk O., Teague V., and Volkamer M., 2015, "Extending helios towards private eligibility verifiability," International Conference on E-Voting and Identity, 57-73.
[15] Kulyk O., Marky K., Neumann S., and Volkamer M., 2016, "Introducing proxy voting to Helios," 11th International Conference on Availability, Reliability, and Security (ARES), 98-106.
[16] Bernhard D., Kulyk O., and Volkamer M., 2017, "Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme," Proceedings of the 12th International Conference on Availability, Reliability and Security, 1-10.
[17] Meyer M., and Smyth B., 2019, "Exploiting re-voting in the Helios election system," Information Processing Letters, 143, 14-19.
[18] Abid N., and Al-Janabi S., 2019, "A Framework for I-Voting based on Helios and Public-Key Certificates," Revista AUS Journal, Special Issue 26-2, 234-243.
[19] Abid N., and Al-Janabi S., 2020, “The secure I-voting system Helios++,” International Journal of Computing and Digital Systems, University of Bahrain (Published online on 25/7/2020).
[20] Bennett C., and Brassard G., 1984, “Quantum cryptography: public key distribution and coin tossing,” International Conference on Computers, Systems and Signal Processing, India, 175-179.
[21] Bennett C., Bessette F., Brassard G., Salvail L., and Smolin J., 1991, “Experimental quantum cryptography,” J. of Cryptology, 5, 3-28.
[22] Sharifi M., and Azizi H., 2007, "A simulative comparison of BB84 protocol with its improved version," Journal of Computer Science & Technology, 7, 87-95.
[23] Qiao H., and Chen X., 2009, "Simulation of BB84 Quantum Key Distribution in depolarizing channel," Proceedings of 14th Youth Conference on Communication, 123-129.
[24] Al-Janabi S., and Hashim R., 2011, “Key reconciliation techniques in quantum key distribution", Proceedings of the First Engineering Conference of the College of Engineering, University of Anbar, 20-27.
[25] Al-Janabi S., and Jasim O., 2011, "Reducing the Authentication Cost in Quantum Cryptography," The 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2011), UK, 363-368.
[26] Sfaxi M., Ghernaouti-Helie S., and Ribordy G., 2005, "Using quantum key distribution within IPSec to secure MAN communications", Proceedings of the IFIP-MAN 2005 Conference on Metropolitan Area Networks, Vietnam, 255-260.
[27] Nguyen T., Sfaxi M., and Ghernaouti-Helie S., 2006, "802.11i encryption key distribution using quantum cryptography," Journal of Networks, 1(5), 33-40.
[28] Al-Janabi S., 2008, “A novel extension of SSL/TLS based on quantum key distribution”, Proceedings of the International Conference on Computer and Communication Engineering (ICCCE08), Malaysia, I, 919-922.
[29] Zhou J., Lu L., Lei Y., and Chen X., 2014, "Research on improving security of protection for power system secondary system by quantum key technology," Power Syst. Technol., 38, 1518-1522.
[30] Sabino M., 2016, “Quantum Cryptography applied to Electronic-Voting Protocols,” M.Sc. Thesis/ Mathematics and Applications, IST, Tecnico, Lisboa.
[31] Qadah G., and Taha R., 2007, "Electronic voting systems: Requirements, design, and implementation," Computer Standards & Interfaces, 29, 376-386.
[32] Cortier V., Galindo D., Küsters R., Mueller J., and Truderung T., 2016, "Sok: Verifiability notions for e-voting protocols," IEEE Symposium on Security and Privacy (SP), 779-798.
[33] Frank M., Halderman J., Aschermann C., Adida B., Holz T., Hu S., et al., 2020, "An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem," 29th {USENIX} Security Symposium, 2020.
[34] Bokslag W., and de Vries M., 2016, "Evaluating e-voting: theory and practice," arXiv preprint arXiv:1602.02509, 2016.
[35] Schneider A., Meter C., and Hagemeister P., 2017, "Survey on remote electronic voting," arXiv preprint arXiv:1702.02798, 2017.
[36] Quaglia E., and Smyth B., 2018, "Authentication with weaker trust assumptions for voting systems," International Conference on Cryptology in Africa, 322-343.
[37]Adida B., De Marneffe O., Pereira O., and Quisquater J., 2009, "Electing a university president using open-audit voting: Analysis of real-world use of Helios," EVT/WOTE, 9, 120-128.
[38] Volkamer M., Spycher O., and Dubuis E., 2011, "Measures to establish trust in internet voting," in Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, 1-10.
[39] Chang-Fong N., and Essex A., 2016, "The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios," Proceedings of the 32nd Annual Conference on Computer Security Applications, 324-335.
[40] Al-Janabi S., 1999, "Quantum Cryptographic Key Distribution in Optical Communication Networks," Ph.D. Thesis, College of Engineering, Al-Nahrain University, Baghdad.