page 1  (12 pages)
2to next section

A Practical Electronic Voting Protocol Using

Threshold Schemes

Ahmad Baraani-Dastjerdi
Josef Pieprzyk
Reihaneh Safavi-Naini

The Centre for Computer Security Research
Department of Computer Science
University of Wollongong
Wollongong, NSW 2500, AUSTRALIA

e-mail: [g9272860, josef, rei].uow.edu.au

May 27, 1994

Abstract

This paper presents a novel secret voting scheme which fully conforms to the requirements of large scale elections. The participants in the scheme are voters, candidates, an administrator, and a counter. The scheme uses threshold encryption to preserve the privacy and accuracy of the votes against dishonesty of voters, candidates, the administrator, and the counter. It also ensures verifiability, fairness, and soundness of the voting process and hence neither administrator nor candidates, or the counter is capable of producing false tally, affecting the voting result, or corrupting/disrupting the election.