Namely, our solution relies on using sets of signing key pairs to represent the different
weights allowed in an election. We also presented a performance enhancing solution for
making the, sometimes large, set of RSA signing key pairs from the same modulus.
To the best of our knowledge, this is the first electronic voting system supporting
votes weights. The same happens with the optimization used for the W RSA key pairs
for each Administrator, we do not know of any system using it.
Considering our requirements — scalability, efficiency, usability and anonymity —,
the first three of them were attained. Regarding anonymity, there is still a problem for
the case of a single voter with a weighted vote. This is a fundamental problem, since it
also exists in paper-based elections. We tried to find a solution to this problem without
interfering with the basic characteristics of REVS but at the end we rejected all the
ideas of how to deal with the problem in this work. Consequently, and in the context of
REVS, our main issue for future work is to deal properly with this privacy issue.
References
1. Cranor, L., Cytron, R.: Sensus: A security-conscious electronic polling system for the Inter-
net. In: Proc. of the Hawaii Int. Conf. on System Sciences, Wailea, Hawaii, USA (1997)
2. Joaquim, R., Z
´
uquete, A., Ferreira, P.: REVS – A Robust Electronic Voting System. IADIS
Int. Journal of WWW/Internet 1 (2003)
3. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems. Comm. of the ACM 21 (1978)
4. Chaum, D.: Blind signature system. In: Advances in Cryptology – CRYPTO ’83 Proc., New
York, USA, Plenum Press (1984) 153–153
5. Lebre, R., Joaquim, R., Z
´
uquete, A., Ferreira, P.: Internet Voting: Improving Resistance to
Malicious Servers. In: IADIS Int. Conf. Applied Computing 2004, Lisboa, Portugal (2004)
6. Joaquim, R.: A fault tolerant voting system for the internet. Master’s thesis, IST / UTL
(2005)
7. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale
Elections. In: Advances in Cryptology – AUSCRYPT ’92 Proc. (LNCS 718), Queensland,
Australia, Springer-Verlag (1992)
8. Herschberg, M.: Secure Electronic Voting Using the World Wide Web. Master’s thesis, MIT
(1997)
9. DuRette, B.: Multiple Administrators for Electronic Voting. Bs.C thesis (1999)
10. Simmons, G.J.: A “weak” privacy protocol using the RSA crypto algorithm. Cryptologia 7
(1983) 180–182
11. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography.
CRC Press (2001) 5th Printing.
12. DeLaurentis, J.M.: A further weakness in the common modulus protocol for the RSA cryp-
toalgorithm. Cryptologia 8 (1984)