Development of a secure remote voting system and research on the characteristics of its anonymity
https://doi.org/10.55648/1998-6920-2023-17-3-106-122
Abstract
Currently, the task of creating a reliable and anonymous remote voting system is relevant. Existing voting systems either do not fully meet the requirements of anonymity, or are closed from research. A scheme was developed for creating an anonymous remote voting system based on the blind electronic signature protocol and the algorithm for creating an anonymous channel. This paper describes possible threats and vulnerabilities of the protocols on which the scheme for constructing an anonymous voting system is based including the threat of a hacker’s sabotage sending his own or other people's ballots over a communication channel. The presented optimized version of the algorithm for creating anonymous remote voting system guarantees the impossibility of fake ballots or their reuse and also excludes possible attempts to sabotage the forwarding of ballots by voters. Formulas for calculating the optimal value of p the probability of sending a ballot directly to the server is defined. It is shown that the value of p must be calculated depending on the number of voters in order to achieve the maximum anonymity of the participants' votes.
About the Author
I. S. DyachkovaRussian Federation
Irina S. Dyachkova - Senior lecturer of the Department of Applied Mathematics and Cybernetics, SibSUTIS.
630102, Novosibirsk, Kirov St. 86
References
1. Google service for creating forms, available at: https://docs.google.com/forms (accessed 01.08.2023).
2. Yandex service for creating polls, available at: https://surveys.yandex.ru (accessed 01.08.2023).
3. SurveyMonkey service for creating polls, available at: https://www.surveymonkey.com (accessed 01.08.2023).
4. Remote Electronic Voting Portal, available at: https://vybory.gov.ru/ (accessed 01.08.2023).
5. Chaum D. Blind Signatures for Untraceable Payments. Chaum, D., Rivest R.L. and Sherman, A.T., Eds., Advances in Cryptology Proceedings of Crypto 82, Plenum (Springer-Verlag), New York, p. 199-203.
6. TAdviser a portal for choosing technologies and suppliers. Kak ustroyeno distantsionnoye elektronnoye golosovaniye v Rossii, i kakiye u nego perspektivy. Tayna golosovaniya [How remote electronic voting works in Russia, and what are its prospects. Secret of voting], available at: https://www.tad-viser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9A%D0%B0%D0%BA_%D1%83%D1%81%D1%82%D1%80%D0%BE%D0%B5%D0%BD%D0%BE_%D0%B4%D0%B8%D1%81%D1%82%D0%B0%D0%BD%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%BE%D0%B5_%D1%8D%D0%BB%D0%B5%D0%BA%D1%82%D1%80%D0%BE%D0%BD%D0%BD%D0%BE%D0%B5_%D0%B3%D0%BE%D0%BB%D0%BE%D1%81%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_%D0%B2_%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8,_%D0%B8_%D0%BA%D0%B0%D0%BA%D0%B8%D0%B5_%D1%83_%D0%BD%D0%B5%D0%B3%D0%BE_%D0%BF%D0%B5%D1%80%D1%81%D0%BF%D0%B5%D0%BA%D1%82%D0%B8%D0%B2%D1%8B#.D0.A2.D0.B0.D0.B9.D0.BD.D0.B0_.D0.B3.D0.BE.D0.BB.D0.BE.D1.81.D0.BE.D0.B2.D0.B0.D0.BD.D0.B8.D1.8F/ (accessed 01.08.2023).
7. Habr a community of IT specialists. Chto zhe ne tak s DEG v Moskve? [What is wrong with the Remote Anonymous Voting in Moscow?], available at: https://habr.com/ru/post/579350/ (accessed 01.08.2023).
8. Habr a community of IT specialists. Chto zhe ne tak s lyubymi elektronnymi golosovaniyami? [What is wrong with any electronic voting?], available at: https://habr.com/ru/post/579968/ (accessed 01.08.2023).
9. Ferguson P., Huston G. What is a VPN? 1998, 22 p., available at: https://www.potaroo.net/papers/vpn.pdf (accessed 01.08.2023).
10. Dingledine R., Mathewson N., Syverson P. Tor: The second-generation onion router. Naval Research Lab Washington DC, 2004. 17 p., available at: https://sharif.edu/~kharrazi/courses/40817-941/reading/tor-design.pdf (accessed 01.08.2023).
11. Dyachkova I., Rakitskiy A. Anonymous remote voting system. 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), Novosibirsk, 2019, pp. 0850-0852.
12. Ryabko B. Ya., Fionov A. N., Shokin Yu. I. Kriptografiya i steganografiya v informatsionnykh tekhnologiyakh [Cryptography and steganography in information technologies]. Novosibirsk, Nauka, 2015. 240 p.
13. Rivest R., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM — NYC, USA: ACM, 1978, 21(2), pp. 120-126. DOI:10.1145/359340.359342.
14. Kerry C. F., Gallagher P. D. Digital signature standard (DSS). FIPS PUB 186-4, 2013, available at: http://people.csail.mit.edu/alinush/6.857-spring-2015/papers/dsa.pdf (accessed 01.08.2023).
15. Shannon C. E. A Mathematical Theory of Communication. Bell System Technical Journal, 1948, 27(3), pp. 379-423, available at: https://onlinelibrary.wiley.com/doi/10.1002/j.1538-7305.1948.tb01338.x (accessed 01.08.2023). DOI: 10.1002/j.1538-7305.1948.tb01338.
16. Ilyin V. A., Sadovnichiy V. A., Sendov Bl. Kh. Matematicheskiy analiz. Tom 1 [Mathematical Analysis. vol. 1]. 3rd ed. Ed. A. N. Tikhonov. Moscow, Prospect, 2006. 661 p.
17. Levitin A.V. Algoritmy. Vvedeniye v razrabotku i analiz [Algorithms. Introduction to development and analysis]. Moscow, Williams, 2006. 576 p.
Review
For citations:
Dyachkova I.S. Development of a secure remote voting system and research on the characteristics of its anonymity. The Herald of the Siberian State University of Telecommunications and Information Science. 2023;17(3):106-122. (In Russ.) https://doi.org/10.55648/1998-6920-2023-17-3-106-122