Automation of voting processes for joint-stock companies using a homomorphic cryptosystem and block-chain technology
DOI:
https://doi.org/10.18372/2225-5036.25.13839Keywords:
blockchain, Paillier cryptographic system, consensus, public key, private key, smart contractAbstract
In the article is proposed a method for conducting a safe voting among shareholders with the preservation of the secrecy of each vote and obtaining a trusted result on the basis of the use of the Paillier cryptographic system, which implements the additive property of ciphertexts. On the basis of the proposed method, the voting protocol using the blockchain technology was implemented. This technology provides a trusted transaction processing environment. The theoretical concepts of technology of the block transaction chain, the mechanism of homomorphic encryption, distributed key generation are briefly outlined. The step-by-step algorithm of operation of the system is given, the main technical aspects and advantages of using decentralized technologies for data storage and processing are described. Existing decisions in the area of voting systems were investigated and a comparative analysis was made. On the basis of the analysis, the main criteria for holding a safe voting process were formed. The method of distributed key generation among participants of the system is briefly described taking into account the differences between the keys of the Paillier cryptosystem from the standard RSA keys. The paper describes in detail the algorithm of the hierarchical generation of shareholder keys. Using this algorithm allows to optimize the process of storing and processing cryptographic materials on a client application. The feasibility of using smart contract technology, which is a decentralized application with a shared data storage environment and consensus algorithm, was also disclosed and substantiated. Contracts represent an algorithm for processing transaction data in the network, allowing to check the rules of operation of the system and conduct logical operations on the data in a secure way. This method can be used to conduct voting in consortia, joint stock companies and private networks, to be integrated into decentralized data storage systems to provide a secure decision mechanism.
References
List of projects that use blockchain. [Елект-ронний ресурс]. Режим доступу: https://en. bitcoin-wiki.org/wiki/Blockchain_Projects_List.
Liu Y. An E-voting Protocol Based on Blockchain. [Електронний ресурс]. Режим доступу: https://eprint.iacr.org/2017/1043.pdf
E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. [Еле-ктронний ресурс]. Режим доступу: https://arxiv. org/pdf/1805.10258.pdf.
National Agency of Public Registry in the Republic of Georgia. [Електронний ресурс]. Режим доступу: https://exonum.com/napr.
Blockchain and future house purchases. [Елект-ронний ресурс]. Режим доступу: https://chromaway. com/landregistry/.
Blokchain Escrow service for financial market. [Електронний ресурс]. Режим доступу: https://serenity-financial.io.
Підпис меморандуму компанією NEM [Електронний ресурс]. Режим доступу: http://land. gov.ua/derzhavnyi-zemelnyi-kadastr-pereishov-na-tekh nolohiiu-blockchain.
Agora [Електронний ресурс]. Режим дос-тупу: https:// static1. squarespace. com / static / 5b0be2f4e2ccd12e7e8a9be9/t/5b6c38550e2e725e9cad3f18/1533818968655/Agora_Whitepaper.pdf.
FollowMyVote [Електронний ресурс]. Ре-жим доступу: https:// followmyvote. com/ crypto-graphically-secure-voting.
Large-scale Election Based On Blockchain. [Електронний ресурс]. Режим доступу: https://www. sciencedirect.com/science/article/pii/S1877050918302874.
Meier A. The ElGamal Cryptosystem. [Еле-ктронний ресурс]. Режим доступу: http://www.mayr. in.tum.de/konferenzen/Jass05/courses/1/papers/meier_paper.pdf.
Voting, Homomorphic Encryption. [Елект-ронний ресурс]. Режим доступу: http://web.mit. edu/6.857/OldStuff/Fall02/handouts/L15-voting.pdf.
O’Keeffe M. The Paillier Cryptosystem. [Електронний ресурс]. Режим доступу: https://owd. tcnj.edu/~hagedorn/papers/CapstonePapers/OKeeffe/CapstoneOKeeffeCryptography.pdf.
Malkin M. Experimenting with Shared Generation of RSA keys. [Електронний ресурс]. Режим доступу: http:// crypto. stanford. edu/~dabo/ papers/ ShareExp.ps.
C. Hazay, G. Mikkelsen, T. Rabin, T. Toft, A. Nicolosi, Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. [Електрон-ний ресурс]. Режим доступу: https://eprint.iacr.org/ 2011/494.pdf.
C. Gentry, A fully homomorphic encryption scheme. [Електронний ресурс]. Режим доступу: https://crypto.stanford.edu/craig/craig-thesis.pdf.
Distributed Paillier Cryptosystem without Trusted Dealer. [Електронний ресурс]. Режим доступу: https://link.springer.com/chapter/10.1007/978-3-642-17955-6_4.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.