New Approach for Online Voting Ensuring Privacy and Verifiability

Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure securi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Programming and computer software 2024-10, Vol.50 (Suppl 1), p.S60-S68
Hauptverfasser: Haroutunian, M. E., Margaryan, A. S., Mastoyan, K. A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page S68
container_issue Suppl 1
container_start_page S60
container_title Programming and computer software
container_volume 50
creator Haroutunian, M. E.
Margaryan, A. S.
Mastoyan, K. A.
description Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally. Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields. In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.
doi_str_mv 10.1134/S0361768824700427
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3123192289</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3123192289</sourcerecordid><originalsourceid>FETCH-LOGICAL-c198t-b30f291754b6a923101b32783239dcdedb84850864002693546997681ad1fe1e3</originalsourceid><addsrcrecordid>eNp1UF1LwzAUDaLgnP4A3wI-V-9N0jR5HGM6YThB3WtJ21QzZluTTtm_N6WCD-LTvXA-7rmHkEuEa0Qubp6AS8ykUkxkAIJlR2SCElTCmcRjMhngZMBPyVkIWwCMLDEhswf7RWdd51tTvtG69XTd7Fxj6abtXfNKF03Y-2F59O7TlAdqmopurHe1M4Xbuf5wTk5qswv24mdOycvt4nm-TFbru_v5bJWUqFWfFBxqpjFLRSGNZhwBC84yxRnXVVnZqlBCpaCkAGBS81RIrWNgNBXWFi2fkqvRN2b92NvQ59t275t4MucY_TRjSkcWjqzStyF4W-edd-_GH3KEfGgq_9NU1LBRE7rhVet_nf8XfQOTbGfG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3123192289</pqid></control><display><type>article</type><title>New Approach for Online Voting Ensuring Privacy and Verifiability</title><source>Springer Nature - Complete Springer Journals</source><creator>Haroutunian, M. E. ; Margaryan, A. S. ; Mastoyan, K. A.</creator><creatorcontrib>Haroutunian, M. E. ; Margaryan, A. S. ; Mastoyan, K. A.</creatorcontrib><description>Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally. Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields. In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.</description><identifier>ISSN: 0361-7688</identifier><identifier>EISSN: 1608-3261</identifier><identifier>DOI: 10.1134/S0361768824700427</identifier><language>eng</language><publisher>Moscow: Pleiades Publishing</publisher><subject>Accountability ; Artificial Intelligence ; Blockchain ; Computer Science ; Cryptography ; Data encryption ; Efficiency ; Electronic data interchange ; Face recognition ; Facial recognition technology ; Hypothesis testing ; Image enhancement ; Internet ; Local elections ; Network security ; Online voting ; Operating Systems ; Packets (communication) ; Privacy ; Referendums ; Security ; Software Engineering ; Software Engineering/Programming and Operating Systems ; Steganography ; Transparency ; Voters ; Voting systems</subject><ispartof>Programming and computer software, 2024-10, Vol.50 (Suppl 1), p.S60-S68</ispartof><rights>Pleiades Publishing, Ltd. 2024. ISSN 0361-7688, Programming and Computer Software, 2024, Vol. 50, Suppl. 1, pp. S60–S68. © Pleiades Publishing, Ltd., 2024.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c198t-b30f291754b6a923101b32783239dcdedb84850864002693546997681ad1fe1e3</cites><orcidid>0000-0002-0742-5082 ; 0009-0008-3221-3402 ; 0000-0002-9262-4173</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1134/S0361768824700427$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1134/S0361768824700427$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Haroutunian, M. E.</creatorcontrib><creatorcontrib>Margaryan, A. S.</creatorcontrib><creatorcontrib>Mastoyan, K. A.</creatorcontrib><title>New Approach for Online Voting Ensuring Privacy and Verifiability</title><title>Programming and computer software</title><addtitle>Program Comput Soft</addtitle><description>Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally. Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields. In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.</description><subject>Accountability</subject><subject>Artificial Intelligence</subject><subject>Blockchain</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Efficiency</subject><subject>Electronic data interchange</subject><subject>Face recognition</subject><subject>Facial recognition technology</subject><subject>Hypothesis testing</subject><subject>Image enhancement</subject><subject>Internet</subject><subject>Local elections</subject><subject>Network security</subject><subject>Online voting</subject><subject>Operating Systems</subject><subject>Packets (communication)</subject><subject>Privacy</subject><subject>Referendums</subject><subject>Security</subject><subject>Software Engineering</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Steganography</subject><subject>Transparency</subject><subject>Voters</subject><subject>Voting systems</subject><issn>0361-7688</issn><issn>1608-3261</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp1UF1LwzAUDaLgnP4A3wI-V-9N0jR5HGM6YThB3WtJ21QzZluTTtm_N6WCD-LTvXA-7rmHkEuEa0Qubp6AS8ykUkxkAIJlR2SCElTCmcRjMhngZMBPyVkIWwCMLDEhswf7RWdd51tTvtG69XTd7Fxj6abtXfNKF03Y-2F59O7TlAdqmopurHe1M4Xbuf5wTk5qswv24mdOycvt4nm-TFbru_v5bJWUqFWfFBxqpjFLRSGNZhwBC84yxRnXVVnZqlBCpaCkAGBS81RIrWNgNBXWFi2fkqvRN2b92NvQ59t275t4MucY_TRjSkcWjqzStyF4W-edd-_GH3KEfGgq_9NU1LBRE7rhVet_nf8XfQOTbGfG</recordid><startdate>20241001</startdate><enddate>20241001</enddate><creator>Haroutunian, M. E.</creator><creator>Margaryan, A. S.</creator><creator>Mastoyan, K. A.</creator><general>Pleiades Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0002-0742-5082</orcidid><orcidid>https://orcid.org/0009-0008-3221-3402</orcidid><orcidid>https://orcid.org/0000-0002-9262-4173</orcidid></search><sort><creationdate>20241001</creationdate><title>New Approach for Online Voting Ensuring Privacy and Verifiability</title><author>Haroutunian, M. E. ; Margaryan, A. S. ; Mastoyan, K. A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c198t-b30f291754b6a923101b32783239dcdedb84850864002693546997681ad1fe1e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accountability</topic><topic>Artificial Intelligence</topic><topic>Blockchain</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Efficiency</topic><topic>Electronic data interchange</topic><topic>Face recognition</topic><topic>Facial recognition technology</topic><topic>Hypothesis testing</topic><topic>Image enhancement</topic><topic>Internet</topic><topic>Local elections</topic><topic>Network security</topic><topic>Online voting</topic><topic>Operating Systems</topic><topic>Packets (communication)</topic><topic>Privacy</topic><topic>Referendums</topic><topic>Security</topic><topic>Software Engineering</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Steganography</topic><topic>Transparency</topic><topic>Voters</topic><topic>Voting systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Haroutunian, M. E.</creatorcontrib><creatorcontrib>Margaryan, A. S.</creatorcontrib><creatorcontrib>Mastoyan, K. A.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>Programming and computer software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Haroutunian, M. E.</au><au>Margaryan, A. S.</au><au>Mastoyan, K. A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>New Approach for Online Voting Ensuring Privacy and Verifiability</atitle><jtitle>Programming and computer software</jtitle><stitle>Program Comput Soft</stitle><date>2024-10-01</date><risdate>2024</risdate><volume>50</volume><issue>Suppl 1</issue><spage>S60</spage><epage>S68</epage><pages>S60-S68</pages><issn>0361-7688</issn><eissn>1608-3261</eissn><abstract>Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, privacy and verifiability. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally. Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. For example, one of such challenges is trying to ensure identification and keep votes private while still being able to verify them. There are quite a few cryptographic schemes which fulfill wide requirements for online elections. Their only disadvantage is inconvenience: they use sophisticated cryptographic tools that make them hard to implement and require expertise in various fields. In this paper we suggest a new approach that ensures this requirements without complex cryptographic methods. First, we propose a novel architecture for an internet voting system that incorporates steganography techniques to enhance the security of the system. In the proposed architecture steganography is used to hide the votes within the data packets transmitted between the storage, that keeps all the votes, and the counting server. The next proposed novelty is the solution of the privacy – verifiability problem using only face recognition, properties of image entropy and hash functions. The advantage of this system is ease of use without loss of security.</abstract><cop>Moscow</cop><pub>Pleiades Publishing</pub><doi>10.1134/S0361768824700427</doi><orcidid>https://orcid.org/0000-0002-0742-5082</orcidid><orcidid>https://orcid.org/0009-0008-3221-3402</orcidid><orcidid>https://orcid.org/0000-0002-9262-4173</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0361-7688
ispartof Programming and computer software, 2024-10, Vol.50 (Suppl 1), p.S60-S68
issn 0361-7688
1608-3261
language eng
recordid cdi_proquest_journals_3123192289
source Springer Nature - Complete Springer Journals
subjects Accountability
Artificial Intelligence
Blockchain
Computer Science
Cryptography
Data encryption
Efficiency
Electronic data interchange
Face recognition
Facial recognition technology
Hypothesis testing
Image enhancement
Internet
Local elections
Network security
Online voting
Operating Systems
Packets (communication)
Privacy
Referendums
Security
Software Engineering
Software Engineering/Programming and Operating Systems
Steganography
Transparency
Voters
Voting systems
title New Approach for Online Voting Ensuring Privacy and Verifiability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T20%3A48%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=New%20Approach%20for%20Online%20Voting%20Ensuring%20Privacy%20and%20Verifiability&rft.jtitle=Programming%20and%20computer%20software&rft.au=Haroutunian,%20M.%20E.&rft.date=2024-10-01&rft.volume=50&rft.issue=Suppl%201&rft.spage=S60&rft.epage=S68&rft.pages=S60-S68&rft.issn=0361-7688&rft.eissn=1608-3261&rft_id=info:doi/10.1134/S0361768824700427&rft_dat=%3Cproquest_cross%3E3123192289%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3123192289&rft_id=info:pmid/&rfr_iscdi=true