Online Voting System Using Homomorphic Encryption
Online Voting System Using Homomorphic Encryption
1051/itmconf/20203203023
ICACC-2020
Abstract. An important part of a democratically fair society are elections. The conventional democratic frame-
work becomes hard for the individuals who can’t visit the polling stall for casting their votes. With quick
advancement of data innovation, online Internet voting framework is all the more intriguing to use for the
nations where vote casting cooperation is low and it is too helpful for people living far off from their homes.
Security is a major worry for Internet voting system. The proposed framework guarantees security prerequisites
for example, validation, precision, secrecy, receipt-freeness, unwavering quality, obviousness and reasonable-
ness in the political race.
Keywords- Paillier algorithm; homomorphic encryption; E-voting
Election are backbone of a democracy, so its important that A homomorphic encryption[10] strategy permits
it should be fair. The way to select your representative is client to work on ciphertext. At the point when client
by voting. In traditional voting system voters have to reach decodes the resultant figure, it is same as though tasks are
polling station and cast their vote, it gets difficult for el- done on plaintext. In this manner, utilizing homomorphic
derly and for those living far from their homes or living in encryption guarantees clients that their information is se-
the remote locality. Voting through internet allows voters cure in all state: stockpiling, transmission and preparing.
to give their votes to their representatives from anywhere Assume if someone wants to sum two numbers together
through internet. online voting system is an application of eg 10 and 20 which are stored in form on encrypted
cryptography. This promises an efficient and secure way number as 98746 and 654421 respectively after that the
of casting and calculating the votes. result of addition 10+20=30 is also stored in encrypted
number as 783356. In traditional way they have to first
Making an voting system on internet has many chal-
decrypt the two numbers than add them and show the
lenges to overcome. Some major issues are voting in a
results. Consider than same situation for a large set of
secured manner and accompanying many voters. There
database example salary record of all employees working
are some internet voting system that cannot work in situ-
in a firm , if we use the traditional way we have to decrypt
ation with many voters. Our proposal uses Homomorphic
all records related to salary of each and every employee
encryption to over come these issues.
, thus exposing data (salary )[11] for employees . But
Homomorphic approach in Internet and systems ad- if we would use Homomorphic encryption we can easy
ministration applications, [8]security is significant worry compute salary on all employees without decrypting there
in the present time of IT. The tremendous measure of data. The computation is done directly on the encrypted
data traded across the Internet is helpless against security data using Homomorphic encryption .Homomorphic
dangers and assaults. Cryptography gives secure trade encryption can either be completely or halfway homomor-
of scrambled information by shared key. The significant phic encryption. A fully homomorphic encryption system
worry with this methodology is information protection provides both multiplication as well as addition of cipher-
as anyone with the key can get to the information. In text. Partially homomorphic encryption supports either
addition, client loses command over information once additive homomorphic or multiplicative homomorphic
it is transferred to the cloud Client must impart a key encryption. Such plan can perform predetermined number
to play out any activities. We need to download and of activities. For instance partial homomorphic encryption
unscramble the information and afterward play out the plans can do multiple addition with one multiplication.
activity. These methodologies lead to security issue and
rehashed encryption decoding. So in this system we have
Pascal Paillier gave Paillier cryptosystem in 1999.
∗ e-mail:
This cryptosystem is an public key system. Paillier cryp-
[email protected]
∗∗ e-mail: [email protected]
tosystem is an partial homomorphic encryption[3] scheme
∗∗∗ e-mail: [email protected] that can can perform addition operation on ciphered data.
∗∗∗∗ e-mail: [email protected] The properties of Paillier’s system are:
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution
License 4.0 (http://creativecommons.org/licenses/by/4.0/).
ITM Web of Conferences 32, 03023 (2020) https://doi.org/10.1051/itmconf/20203203023
ICACC-2020
2
ITM Web of Conferences 32, 03023 (2020) https://doi.org/10.1051/itmconf/20203203023
ICACC-2020
3 Proposed Methodology themselves using login id(which will be there voter id)
and password that was set by the user in registration phase
In today’s competitive worlds most of the lot of things . Thus using user id and password users can get uniquely
are created on online platform similarly in internet voting authenticated.
system voter can cast their votes without visiting the elec-
tion booth. Online voting system utilizes homomorphic 3) Voting stage: In this stage voter can give their
encryption to count votes. The final outcome is taken vote . They can give vote to their selected candidate . The
from encrypted collection of votes without decrypting vote given by voters to their selected candidates are then
them, [4]. so it remains unknown who voted whom. In encrypted using Paillier encryption. The encrypted votes
this system integrity and anonymity of the voter remains are stored in database which will be then tallied in tally
hidden. The voter should have to create their own account stage.
on this portal by verified government documents. The
several stages for online voting system are given below. 4) calculation stage: In this phase Votes that are
stored in encrypted (using homomorphic encyption) form
in database are added to get total no of votes received by
the respective parties.
10 gANjcGhlLnBhaWxsaWVyCkVuY3J5c
20 gANjcGhlLnBhaWxsaWVyCkVuY3J
10+20=30 gANjcGhlLnBhaWxsaWVyCkVuY3
3
ITM Web of Conferences 32, 03023 (2020) https://doi.org/10.1051/itmconf/20203203023
ICACC-2020
After successful registration stage user can login After successfully casting their vote, voter’s are shown a
with their voterid as username and password that is set by message of successfully voted and the voter are sent back
them. Thus voters will be authenticated uniquely with the to the login page and that voter cannot login again to vote.
combination of voter id and password. If they try to login again they will be shown a message
"Already voted".
4
ITM Web of Conferences 32, 03023 (2020) https://doi.org/10.1051/itmconf/20203203023
ICACC-2020
5 Conclusion too helpful for people living far o “On data banks
and privacy. homomorphisms,” Foundations of secure
Voting through internet has attracted many people specif-
computation, vol. 4, no. 11, pp. 169–180, 1978.
ically people living far from their homes than traditional
system of voting. From past few years a lot of researchers [8] C. Gentry et al. , “Fully homomorphic encryption
have started seeking interest in this field due to trans- using ideal lattices.”. in STOC, vol. 9, 2009, pp.
parency and security concern. This research paper de- 169–178.
scribes the internet voting system using Paillier algorithm [9] Z. Brakerski, C. Gentry, and V. Vaikuntanathan,
and its homomorphic characteristics. This system gives “(leveled) fully homomorphic encryption without
a assurance of data confidentiality and data integrity in bootstrapping,”. in Proceedings of the 3rd Innovations
in Theoretical Computer Science Conference. ACM,
which it will uses homomorphic properties for calculation
2012, pp. 309–325.
of votes in there encrypted form and then decrypting them
to get only total votes thus keeping it secure. This sys- [10] A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A
tem is equivalent to system in which votes are taken in survey on homomorphic encryption schemes: Theory
unencrypted form and then added to get then total votes and implementation,”. ACM Comput. Surv., vol. 51,
received by the party. Thus it provides us with the use full- pp. 79:1–79:35, July 2018.
ness of traditional system plus the security and modularity [11] P. Y. Ryan, S. Schneider, and V. Teague, “End-to-end
of modern system. verifiability in voting systems, from theory to prac-
tice,” IEEE Security and Privacy, vol. 13, no. 3, pp.
59–62, 2015.
References [12] I. Damgard, M. Jurik, and J. B. Nielsen, “A gener-
[1] Salavi R.R., Math M.M., Kulkarni U.P. (2019) A Sur- alization of paillier’s public-key system with applica-
vey of Various Cryptographic Techniques: From Tra- tions to electronic voting,” International Journal of In-
ditional Cryptography to Fully Homomorphic Encryp- formation Security, vol. 9, no. 6, pp. 371–385, 2010.
tion. In: Saini H., Sayal R., Govardhan A., Buyya R. [13] P. Paillier, Public-Key Cryptosystems Based on
(eds) Innovations in Computer Science and Engineer- Composite Degree Residuosity Classes. Berlin, Hei-
ing. Lecture Notes in Networks and Systems, vol 74. delberg: Springer Berlin Heidelberg, 1999, pp.
Springer, Singapore 223–238.
[2] K. K. Chauhan, A. K. S. Sanger and A. Verma, "Ho- [14] D. Hrestak and S. Picek, “Homomorphic encryp-
momorphic Encryption for Data Security in Cloud tion in the cloud,” in Information and Communi-
Computing," 2015 International Conference on Infor- cation Technology, Electronics and Microelectron-
mation Technology (ICIT), Bhubaneswar, 2015, pp. ics (MIPRO), 2014 37th International Convention on.
206-209. IEEE, 2014, pp. 1400–1404.
[3] M. Nassar, A. Erradi and Q. M. Malluhi, "Paillier’s [15] C. Ngo, “Secure voting system using paillier homo-
encryption: Implementation and cloud applications," morphic encryption,” Ph.D. dissertation, Texas AM
2015 International Conference on Applied Research University–Corpus Christi, 2014.
in Computer Science and Engineering (ICAR), Beirut, [16] Y. Yang, S. Zhang, J. Yang, J. Li, and Z. Li, “Tar-
2015, pp. 1-5. geted fully homomorphic encryption based on a dou-
[4] Shihab, T Liji, P. (2017). Simple and secure internet ble decryption algorithm for polynomials,” Tsinghua
voting scheme using generalized paillier cryptosys- science and technology, vol. 19, no. 5, pp. 478– 485,
tem. 551-557. 10.1109/ICICICT1.2017.8342623. 2014.
[5] M. Togan and C. Pleca, “Comparison-based compu- [17] A. Snak, S. Ozkan, H. Yldrm, and S. Kiraz, “End-2-
tations over fully homomorphic encrypted data,”. in end verifiable internet voting protocol based on homo-
Proc. 10th International Conf. Communications, pp. morphic encryption,” International Journel Of Infor-
1–6, 2014 mation Security Science, vol. 3, no. 2, pp. 165–181,
[6] C. Gentry, “Fully homomorphic encryption using 2014.
ideal lattices,”. in Proc. the 41st Annual ACM Symp. [18] A. Huszti, “A homomorphic encryption-based se-
Theory of Computing, pp. 169- 178, 2009. cure electronic voting scheme,” Faculty of Informat-
[7] R. L. Rivest, L. Adleman, and M. L. Dertouzos, na- ics. University of Debrecen. Hungary, 2011.
tions where vote casting cooperation is low and it is