Problems, construction principles and development prospects of the national electronic voting system in Ukraine
DOI:
https://doi.org/10.30837/rt.2020.1.200.08Keywords:
electronic voting, decentralization, information technology, blockchain networks, information and cy-bersecurityAbstract
The present paper considers national electronic voting system problems in Ukraine, principles of construction and development prospects. Electronic voting refers to a way to exercise will, in which the voting, counting, and publication of the results processes are carried out by electronic means and systems. Most existing voting systems are built on centralized principles and this allows providing certain advantages, for example, high controllability of the system, its reliability, and autonomy. However, hierarchical systems also have significant drawbacks, in particular, single decision center and centralized storage leads to vulnerability to cyberattacks on them. Also it should be noted, that in centralized systems due to the abuse of administrative resources distortions of the results of expression of will are possible. This is the biggest threat to the modern democratic information society. Research, development, and implementation of new technologies of electronic voting, which would make it impossible to intervene and distort the results of the will through decentralization while maintaining all the system qualities for safety and reliability are promising. This article proposes particular proposals for architecture substantiating as well as a basic model and interaction protocols of a decentralized electronic blockchain voting system. A two-level blockchain voting architecture is proposed, researched and verified through physical prototyping. Its implementation will increase confidence in information resources and services (which is especially important for government agencies) will reduce time and overhead costs; make it impossible for centralized institutions to intervene and possible corrupt practices; will increase the reliability of information storage and the quality of services provided.References
Hannu Nurmi, Arto Salomaa. Conducting secret ballot elections in computer networks: Problems and solutions // Annals of Operations Research / University of Turku. 1994. №51. Р.185-194.
Закон України “Про вибори депутатів Верховної Ради Автономної Республіки Крим, місцевих рад та сільських, селищних, міських голів”.
Закон України “Про вибори президента України”.
Закон України “Про електронні довірчі послуги”.
Регламент (ЄС) № 910/2014 Європейського Парламенту та Ради від 23 липня 2014 року «Про електронну ідентифікацію та довірчі послуги для електронних транзакцій у межах внутрішнього ринку та про скасування Директиви 1999/93/ЄС» (1) (COM (2012) 0238-C7-0133/2012 – 2012/0146 (COD)).
Горбенко І.Д., Кузнецов О.О., Потій О.В., Горбенко Ю.І., Полуяненко М.О. Технологія блокчейн: огляд, сучасні проблеми та перспективи впровадження в Україні // ІІ міжнар. наук.-практ. конф. “Проблеми кібербезпеки інформаційно-телекомунікаційних систем” (PCSIТS), 11-12 квітня 2019 р., м. Київ, 2019. С. 217-220.
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997, 794 р.
Yu. І. Gorbenko, K. V. Isirova. Improved mechanism of one-time keys for post-quantum period based on the hashing functions // Telecommunications and Radio Engineering. 2018. Vol. 77, Issue 14. Р. 1277-1296.
Andrushkevych A., Gorbenko Y., Kuznetsov O., Oliynykov R., Rodinko M. A. A Prospective Lightweight Block Cipher for Green IT Engineering // Kharchenko V., Kondratenko Y., Kacprzyk J. (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems. Decision and Control. 2019. Vol. 171. Springer, Cham, pp. 95-112. DOI: 10.1007/978-3-030-00253-4_5
Потій О. В., Ісірова К. В. Аналіз вимог та моделей безпеки для постквантової криптографії // Математичне та комп’ютерне моделювання. Серія: Технічні науки : зб. наук. праць / Інститут імені В. М. Глушкова Національної академії наук України, Кам’янець-Подільський нац. ун-т імені Івана Огієнка. Кам’янець-Подільський : Кам’янець-Подільський нац. ун-т ім. Івана Огієнка, 2017. Вип. 15- с. 192-197.
Kateryna Isirova. Blockchain Technology as the Prospective Instrument for Ensuring Electronic Trust Services in Conditions of Cyberthreats // European Cybersecurity Journal. 2018. Issue 5 (1). P 34-43.
Gorbenko I., Kuznetsov A., Gorbenko Y., Vdovenko S., Tymchenko V., Lutsenko M. (). Studies on Statistical Analysis and Performance Evaluation For Some Stream Ciphers // International Journal of Computing. 2019. 18(1). Р. 82-88.
Bernstein D., Buchmann J., Dahmen E. Post-Quantum Cryptography. Springer-Verlag, Berlin-Heidleberg, 2009. 245 p.
Pass R., Seeman L., Shelat A. Analysis of the blockchain protocol in asynchronous networks // Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017. Р. 643-673.
Isirova K., Potii O. Decentralized public key infrastructure development princi-ples // IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). Kiev, 2018. Р. 305-310.
Kovalchuk L., Kaidalov D., Nastenko A., Rodinko, Shevtsov O., Oliynykov R. Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization // IEEE INFOCOM 2019, Paris, France, 2019. Р. 216-221. doi: 10.1109/INFCOMW.2019.8845301
Nurmi H., Salomaa A. Conducting secret ballot elections in computer networks : Problems and solutions // Annals of Operations Research, 1994. Vol. 51, no. 4. Р. 185–194.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).