DOI QR코드

DOI QR Code

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun (Div. of Information & Communication Engineering, Baekseok University) ;
  • Lim, Heui-Seok (Dept. of Computer Science Education, Korea University)
  • Received : 2012.04.09
  • Accepted : 2012.12.09
  • Published : 2013.01.31

Abstract

It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Keywords

References

  1. J. Tepandi, I. Tšahhirov and S. Vassiljev, "Wireless PKI Security and Mobile Voting," IEEE Computer, vol. 43, no. 6, pp. 54-60, June, 2010.
  2. R. Want, "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, vol. 9, no. 3, pp. 6-9, July, 2010.
  3. C. Vivaracho-Pascual and J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 42, no. 2, pp. 213-222, Mar. 2012.
  4. The 3GPP Project, "Characteristics of the USIM Application," 3GPP TS 31.02, http://www.3gpp. org/ftp/Specs/html-info/31102.htm.
  5. P. Urien, "Convergent identity: Seamless OPENID services for 3G dongles using SSL enabled USIM smart cards," IEEE CCNC, pp. 830-831, Jan. 2011.
  6. N. K. Ratha, J. H. Connell and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
  7. E. Maler and D. Reed, "The Venn of Identity: Options and Issues in Federated Identity Management," IEEE Security & Privacy, vol. 6, no. 2, pp. 16-23, March, 2008.
  8. D. Evans and N. Paul, "Election Security: Perception and reality," IEEE Security & Privacy, vol. 2, no. 1, pp. 24-31, Jan. 2004. https://doi.org/10.1109/MSECP.2004.1264850
  9. W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976. https://doi.org/10.1109/TIT.1976.1055638
  10. T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
  11. D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology, CRYPTO'89, LNCS 435, Springer, pp. 212-216, 1990.
  12. D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, Vol. 24, No. 2, pp. 84-90, Feb. 1981. https://doi.org/10.1145/358549.358563
  13. S. H. Yun, "The USIM based Biometric Multi-Signature for Mobile Content Authentication," ICONI 2011, pp. 137-141, 2011.
  14. B. C. Lee, K. J. Kim, "Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer," ICISC 2002, LNCS 2587, Springer, pp. 389- 406, 2003.
  15. A. Baraani-Dastjerdi, J. Pieprzyk and R. Safavi-Naini, "A Secure Voting Protocol Using Threshold Schemes," In Proc. of COMPSAC'95, pp. 143-148, 1995.
  16. P. Horster, M. Michels and H. Petersen, "Blind Multisignature Schemes and Their Relevance for Electronic Voting," In Proc. of COMPSAC'95, pp. 149-155, 1995.
  17. A. Fujioka, T. Okamoto and K. Ohta, "A practical secret voting scheme for large scale elections," Advances in Cryptology, AUSCRYPT'92, LNCS 718, Springer, pp. 244-251, 1993.
  18. C. Boyd, "A New Multiple Key Cipher and an Improved Voting Scheme," Advances in Cryptology, EUROCRYPT'89, LNCS 434, Springer, pp. 617-625, 1990.
  19. S. H. Yun, H. S. Lim, Y. S. Jeong, S. Y. Jung and J. K. Chang, "The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits," Wireless Personal Communications, Springer, vol. 60, no. 3, pp. 405-418, Oct. 2011. https://doi.org/10.1007/s11277-011-0298-3
  20. A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, Kluwer, vol. 38, no. 2, pp. 237-257, Feb. 2006. https://doi.org/10.1007/s10623-005-6343-z
  21. ITU-T X.1088, (2008). A Framework for biometric digital key generation, ITU-T.

Cited by

  1. 모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구 vol.11, pp.11, 2013, https://doi.org/10.14400/jdpm.2013.11.11.795
  2. Analysis of Authentication Methods for Smartphone Banking Service using ANP vol.8, pp.6, 2014, https://doi.org/10.3837/tiis.2014.06.016
  3. 바이오메트릭 인증 기반의 동적 그룹 서명 기법 vol.7, pp.1, 2016, https://doi.org/10.15207/jkcs.2016.7.1.049