TY - JOUR
T1 - Secure order based voting using distributed tallying
AU - Tassa, Tamir
AU - Dery, Lihi
AU - Zamarin, Arthur
N1 - Publisher Copyright:
© 2025 The Authors
PY - 2025/7/1
Y1 - 2025/7/1
N2 - Electronic voting systems have significant advantages in comparison with physical voting systems. One of the main challenges in e-voting systems is to secure the voting process: namely, to certify that the computed results are consistent with the cast ballots and that the voters’ privacy is preserved. We propose herein a secure voting protocol for elections that are governed by order-based voting rules. Our protocol, in which the tallying task is distributed among several independent talliers, offers perfect ballot secrecy in the sense that it issues only the required output while no other information on the cast ballots is revealed. Such perfect secrecy, achieved by employing secure multiparty computation tools, may increase the voters’ confidence and, consequently, encourage them to vote according to their true preferences. We implemented a demo of a voting system that is based on our protocol and we describe herein the system's components and its operation. Our implementation demonstrates that our secure order-based voting protocol can be readily implemented in real-life large-scale electronic elections.
AB - Electronic voting systems have significant advantages in comparison with physical voting systems. One of the main challenges in e-voting systems is to secure the voting process: namely, to certify that the computed results are consistent with the cast ballots and that the voters’ privacy is preserved. We propose herein a secure voting protocol for elections that are governed by order-based voting rules. Our protocol, in which the tallying task is distributed among several independent talliers, offers perfect ballot secrecy in the sense that it issues only the required output while no other information on the cast ballots is revealed. Such perfect secrecy, achieved by employing secure multiparty computation tools, may increase the voters’ confidence and, consequently, encourage them to vote according to their true preferences. We implemented a demo of a voting system that is based on our protocol and we describe herein the system's components and its operation. Our implementation demonstrates that our secure order-based voting protocol can be readily implemented in real-life large-scale electronic elections.
KW - Multiparty computation
KW - Order-based voting rules
KW - Secret sharing
KW - Secure voting
UR - https://www.scopus.com/pages/publications/105009463015
U2 - 10.1016/j.jisa.2025.104141
DO - 10.1016/j.jisa.2025.104141
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:105009463015
SN - 2214-2134
VL - 93
SP - 104141
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
M1 - 104141
ER -