%0 Conference Proceedings %T A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network %+ Ho Chi Minh City University of Technology [Vietnam National University, HCM] (HCMUT) %A Nguyen, Thi, Thao %A Dang, Tran, Khanh %Z Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 11-20 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_2 %K Electronic voting %K blind signature %K dynamic ballot %K uncoercibility %K receipt-freenesss %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X In this paper, we introduce a novel electronic voting protocol which is resistant to more powerful corrupted parties and coercers than any previous works. They can be the voting authorities inside the system who can steal voters’ information and the content of their votes, or the adversaries outside who try to buy the votes, and force voters to follow their wishes. The worst case is that the adversaries outside collude with all voting authorities inside to destroy the whole system. In previous works, authors suggested many complicated cryptographic techniques for fulfilling all security requirements of electronic voting protocol. However, they cannot avoid the sophisticated inside and outside collusion. Our proposal prevents these threats from happening by the combination of blind signature, dynamic ballots and other techniques. Moreover, the improvement of blind signature scheme together with the elimination of physical assumptions makes the newly proposed protocol faster and more efficient. These enhancements make some progress towards practical security solution for electronic voting system. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480235/document %2 https://inria.hal.science/hal-01480235/file/978-3-642-36818-9_2_Chapter.pdf %L hal-01480235 %U https://inria.hal.science/hal-01480235 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804