Abstract
In this paper we propose an e-voting authentication scheme combined with QR-codes and visual cryptography. We focus on the usability, in order to supply voters with less technical experience with a usable scheme. The only requirement is that the user needs to handle a device containing a QR-code reader, most probably a smartphone. This approach is based on visual cryptography as the work horse: The e-voting passwords for authentication are encoded as QR-codes and later encrypted into shadow transparencies. Thus, the transparency by itself conveys no information but when the layers are combined, the secret password is revealed.
Chapter PDF
Similar content being viewed by others
References
Iso/iec 18004:2000 qr code bar code symbology specification
Borchert, B., Reinhardt, K.: Applications of Visual Cryptography. In: Visual Cryptography and secret image sharing, pp. 329–350. CRC Press Taylor & Francis (2012)
Burton, C., Culnane, C., Heather, J., Peacock, T., Ryan, P.Y.A., Schneider, S., Srinivasan, S., Teague, V., Wen, R., Xia, Z.: Using pret a voter in victorian state elections. In: Proceedings of the 2012 International Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 2012, p. 1. USENIX Association, Berkeley (2012)
Cimato, S., Prsico, R.D., Santis, A.D.: Visual Cryptography for Color Images. In: Visual Cryptography and secret image sharing, pp. 32–56. CRC Press Taylor & Francis (2012)
Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret-ballot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 72–83. Springer, Heidelberg (1996)
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc. (2003)
Jagdeep Verma, V.K.: A visual cryptographic technique to secure image shares. International Journal of Engineering Research and Applications 2, 1121–1125 (2012)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Paul, N., Evans, D., Rubin, A., Wallach, D.: Authentication for remote voting. In: Workshop on Human-Interaction and Security Systems (2003)
Shimizu, T., Isami, M., Terada, K., Ohyama, W., Kimura, F.: Color recognition by extended color space method for 64-color 2-d barcode. In: Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2011), pp. 259–262 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E. (2014). E-voting Authentication with QR-codes. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. https://doi.org/10.1007/978-3-319-07620-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-07620-1_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07619-5
Online ISBN: 978-3-319-07620-1
eBook Packages: Computer ScienceComputer Science (R0)