Proof of the possibility for a public audit of a secret internet voting system
Abstract
The aim of this study is to prove the possibility of building a system of secret Internet voting, in which a full-fledged audit is available to all voters and their proxies. A full-fledged audit should be understood as such an audit, in which everything that may be in doubt is checked. The open block of servers was created using Raspberry Pi 3 Model B type minicomputers, which are widely known and well-established. On the basis of an open block of servers, a full-scale model of the system for conducting experimental voting was created and a detailed methodology for a full-fledged audit was developed. This methodology provides for two stages of the audit. In the first stage, voters or their proxies must be present near the server unit. In the second stage, they continue the audit remotely through a dedicated server without losing information about the security of their data. For practical acquaintance with this research, the possibility of experimental voting is given. The experiment can be conducted by anyone at any time through a link on the Internet. Thus, it is shown that not only with traditional secret voting technologies, a full-fledged audit is possible, thanks to which voters have no doubts about maintaining the secrecy of their votes and the honesty of the results. To conduct a full-fledged audit according to the described methodology, it is not require to involve highly qualified specialists, but school education, which is mandatory in many countries, is quite enough. The importance of the results is that the lack of a full-fledged audit of Internet voting systems is the main factor hindering the development of e-democracy. The lack of public auditing of Internet voting systems causes distrust in the possibility of using the Internet to conduct fair elections
Downloads
References
Electronic Vote & Democracy. Available at: http://www.electronic-vote.org
Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi: https://doi.org/10.1007/978-981-15-5558-9_19
Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi: https://doi.org/10.1007/978-3-030-60347-2_14
Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US20170109955A1. Blockchain Electronic Voting System and Method. Available at: https://patents.google.com/patent/US20170109955A1/en
Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi: https://doi.org/10.1109/icsa-c52384.2021.00033
Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi: https://doi.org/10.1109/sti50764.2020.9350399
Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi: https://doi.org/10.1109/icoin50884.2021.9333966
Schneier, B. (2020) Voatz Internet Voting App Is Insecure. Available at: https://www.schneier.com/crypto-gram/archives/2020/0315.html#cg1
Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectID=0900001680726f6f
Khlaponin, Y., Vyshniakov, V., Ternavska, V., Selyukov, O., Komarnytskyi, O. (2021). Development of audit and data protection principles in electronic voting systems. Eastern-European Journal of Enterprise Technologies, 4 (2 (112)), 47–57. doi: https://doi.org/10.15587/1729-4061.2021.238259
Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at: http://urss.knuba.edu.ua/files/zbirnyk-20/22.pdf
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4). doi: https://doi.org/10.18372/2410-7840.18.11085
Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi: https://doi.org/10.1109/tit.1976.1055638
Vyshnyakov, V. M., Komarnitskiy, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Accent Graphics Communications & Publishing. Available at: http://www.asdev.com.ua/dndiasb/assets/files/Vyshnyakov/e-voting.pdf
Copyright (c) 2023 Yurii Khlaponin, Volodymyr Vyshniakov, Oleh Komarnytskyi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.