<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Anonymous Decentralized E-Voting System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kharkiv National University of Radio Electronics</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine olkurbatov@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Distributed Lab</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine pavel@distributedlab.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kherson State Agricultural University</institution>
          ,
          <addr-line>Kherson</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Water and Environmental Engineering</institution>
          ,
          <addr-line>Rivne</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This document describes the principles for building an anonymous decentralized e-voting system. It is proposed to use a ring signature mechanism to ensure anonymity of voters and blockchain technology to ensure the integrity and transparency of the transaction history. Thus, it can be beneficial to use such a combination to ensure the maximal robustness of the systems in the realworld conditions with the persistence of a potential malefactor that is interested to disrupt the work of the system, change the data in some way or influence the processes that are happening inside of the system.</p>
      </abstract>
      <kwd-group>
        <kwd>blockchain technology</kwd>
        <kwd>public key infrastructure</kwd>
        <kwd>decentralized system</kwd>
        <kwd>e-voting system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Voting is a method for a group, such as a meeting or an electorate, in order to make a
collective decision or express an opinion, usually following discussions, debates or
election campaigns [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
      <p>
        Traditional voting systems have ceased to be effective in terms of their
requirements [
        <xref ref-type="bibr" rid="ref1 ref4 ref5 ref6 ref7">1, 4-7</xref>
        ]: paper ballots, pseudo-anonymity of voters, non-transparency of the
vote count (this is especially critical for the current field of research), the dependence
of (the entire) voting procedure on the central organization. In fact, these are only the
most critical problems existing in existing voting systems.
      </p>
      <p>
        In recent years, the digitization of the voting process is developing more and more
actively. The most prominent examples are the introduction of a digital voting system
for electing local authorities in Estonia since 2005 and attempts to introduce such a
system in Switzerland, Netherlands, India and Namibia [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ]. However, existing
solutions still have several flaws, in particular, vulnerabilities associated with the
central authority checking all results [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11-14</xref>
        ].
      </p>
      <p>
        The described approach allows conduct e-voting while ensuring the transparency
of processes and the integrity of the voting history [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. However, some voting
systems also require another property for system users anonymity [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14-17</xref>
        ]. It is necessary
to further investigate the methods and mechanisms of cryptographic protection of
information [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29">18-29</xref>
        ], various protocols for ensuring integrity, authenticity,
confidentiality and other security services [
        <xref ref-type="bibr" rid="ref30 ref31 ref32 ref33 ref34 ref35 ref36 ref37">30-37</xref>
        ].
      </p>
      <p>Further, we will describe how to ensure voters’ anonymity while maintaining all
other properties of an accounting system.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Ring signature mechanism</title>
      <p>
        Ring signatures are used to ensure the anonymity of users among a specific set of
other members of a group (ring). To generate such a signature, the user uses the
public keys of other users and his key pair. When verifying a signature, a verifier can
verify that it was calculated by one of the members of the ring, but it is not known by
whom exactly [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ].
      </p>
      <p>Imagine a group of n users, as in Figure 1. Each user has his own key pair — a
secret and public key (sk, PK). Secret keys are known only to their owners, public keys
- to all participants of the system.</p>
      <p>In order to form a signature on behalf of the group, the user must input the public
keys of all the ring participants (including his own) to the algorithm input, and use his
own private key as a secret. Recall that the public keys of each of the participants are
publicly available. Figure 2 shows how the ring signature is generated by the user
number 4.</p>
      <p>
        When the verifier verifies the value of the signature, he can verify that the
signature was generated by one of the group members, however it is unknown by whom.
Only with a probability of 1 / n can he determine that the signature was calculated by
a specific participant in the ring (Figure 3). It is worth noting that the user can be
disclosed only in the case of collusion of all the other members of the group [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Architecture of Decentralized E-Voting System</title>
      <p>The decentralized anonymous voting system consists of the following elements:
 Validators;
 User identity system;
 End users.</p>
      <p>Schematically, the arrangement of components and their interconnection can be
represented in Figure 4.</p>
      <p>Nodes validators are the main nodes of the system. They process user transactions
and reach consensus on a distributed database.</p>
      <p>User identification systems are required to provide information about user
identifiers with which users will prove their right to vote. The identification system can be
either a centralized internal (or external) identity provider, or a distributed
identification and certification system.</p>
      <p>End users perform the role of voters in the system. They independently vote for
making a certain decision. It is important to ensure their anonymity, and at the same
time transparency in the voting process.
In order to vote, the user needs to form and sign the corresponding transaction. The
transaction structure is as follows (Figure 5):</p>
      <p>Now let’s look at the transaction class that was implemented using the Java
programming language and make a quick overview of its methods.
public class Transaction {
private byte[] txID;
private int nonce;
private byte[] candidateID;
private long timestamp;
private byte[] signature;
}
...
public void printTxID();
private byte[] generateTxID(int nonce, byte[]
candidateID, long timestamp, byte[] signature);
public void printTransaction();
private byte[] signTransaction(int nonce, byte[]
candidateID, long timestamp);
 printTxID allows to see the transaction identifier in HEX form to verify it and use
in other parts of the real system;
 generateTxID implements a SHA-256 algorithm to hash transaction contents. The
resulting hash is used as an ID;
 printTransaction allows to see the transaction contents in the console and can be
modified so these contents can be used in other parts of the real system;
 signTransaction implements the ring signature mechanism to sign the contents of
transaction.</p>
      <p>The transaction identifier is a hash value from all other transaction fields. The
nonce field contains a random value and is used to make the transaction unique.
Candidate ID contains the identifier of the voting entity for which the voter wants to cast
his vote. Timestamp - UNIX value of the transaction formation time. Public keys of
group is a list of public keys of the participants of the ring (those used to generate the
signature). Among these keys is also the voter’s public key, but his position is
unknown. Signature is the transaction signature value. Note that this transaction
structure is not strict, additional fields may be present.</p>
      <p>In order to sign a transaction and at the same time ensure the anonymity of the
vote, the user selects a list of keys of other users. At the same time, it is important that
the selected public keys really belong to other voters (they had permission to vote).
The list of public keys of voters should be open to all participants in the system. This
list is formed before the start of voting (registered and provided the public key - got
into the voter list).</p>
      <p>
        The number of selected keys depends on the level of anonymity of the voter. If the
selected group is small, then the probability of de-anonymization of the voter is much
higher [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ].
      </p>
      <p>After the user selects a set of public keys, he calculates the value of the ring
signature for the transaction. After that, it sends the transaction to one of the platform
validators (or several) as in Figure 6.</p>
      <p>After the validator receives a transaction, he must verify that the sender has the
right to vote. Note that the validator does not know the identifier of the sender of the
transaction (or rather, he does not know which of the public keys specified in the
transaction belongs to the voter). Therefore, it needs to check the permissions of all
keys specified in the transaction.</p>
      <p>
        If all the specified keys have permission to vote, then the transaction is correct and
can be confirmed [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ]. At this stage, there is also a need to check that the user cannot
conduct several transactions from different groups (since the sender of each
transaction is unknown, then without a protection mechanism, the attacker can conduct
transactions by constantly changing groups, and all of them will be valid). The image
of a secret key is used as a protective mechanism [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ].
      </p>
      <p>Since this image is unique for each key pair (and it is used in creating and verifying
signatures), the user cannot sign several transactions using the same secret key. The
transaction confirmation process is shown in Figure 7.</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>Using the described approach to build an anonymous e-voting system allows you
to achieve the following benefits:
 the ability to verify voter permissions (voting rights);
 anonymity;
 the ability of the voter to verify the correctness of his vote;
 inability to conduct a double waste attack.</p>
      <p>On the one hand, this approach allows validators to check whether the sender of a
transaction has the right to vote (if he used the existing public keys of other
participants to form the ring).</p>
      <p>At the same time, a specific voter can only be determined by validators with a
certain probability (the larger the ring size, the less likely it is). In addition, a user can be
completely deanonymized if all of the other members of the group collude (and reveal
their votes).</p>
      <p>
        Each user can make sure that his voice has been added to the distributed registry
(request to the validator or using SPV-approach [
        <xref ref-type="bibr" rid="ref42 ref43">42-43</xref>
        ]). In addition, each owner of
the complete history can verify that the voting results correspond to the set of
completed transactions.
      </p>
      <p>
        The user cannot create new transactions with different groups, if you use the
mechanism of protection against attacks with double costs (the image of the private key,
details with signature mechanism in [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]).
      </p>
      <p>
        Also based on this scheme, the user may be allowed to change the value of his
voice. In this case, not one transaction will be counted, but the last transaction that
was added to the block chain. However, in this case it is necessary to develop and
implement security measures to prevent spam attacks and other attacks that may
affect system performance [
        <xref ref-type="bibr" rid="ref44 ref45 ref46 ref47 ref48">44-48</xref>
        ], as well as data stored in the chain [
        <xref ref-type="bibr" rid="ref49 ref50 ref51 ref52 ref53">49-53</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Rodríguez-Pérez</surname>
          </string-name>
          ,
          <article-title>"Secret suffrage in remote electronic voting systems,"</article-title>
          <source>2017 Fourth International Conference on eDemocracy &amp; eGovernment (ICEDEG)</source>
          ,
          <year>Quito</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>277</fpage>
          -
          <lpage>278</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>R.</given-names>
            <surname>Stein</surname>
          </string-name>
          and
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Wenda, "The Council of Europe and e-voting: history and impact of Rec(</article-title>
          <year>2004</year>
          )
          <volume>11</volume>
          ,
          <article-title>" 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE)</article-title>
          ,
          <year>Lochau</year>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>J.</given-names>
            <surname>Pomares</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Levin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Alvarez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Mirau</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ovejero</surname>
          </string-name>
          ,
          <article-title>"From piloting to rollout: voting experience and trust in the first full e-election in Argentina," 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE)</article-title>
          ,
          <year>Lochau</year>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bhuvanapriya</surname>
            <given-names>R.</given-names>
          </string-name>
          , Rozil Banu S.,
          <string-name>
            <surname>Sivapriya</surname>
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kalaiselvi</surname>
            <given-names>V.K.G.</given-names>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Smart voting," 2017 2nd International Conference on Computing and Communications Technologies (ICCCT)</source>
          ,
          <year>Chennai</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>143</fpage>
          -
          <lpage>147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>K.</given-names>
            <surname>Weldemariam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mattioli</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Villafiorita</surname>
          </string-name>
          ,
          <article-title>"Managing Requirements for E-Voting Systems: Issues and Approaches,"</article-title>
          2009 First International Workshop on Requirements Engineering for e-Voting
          <string-name>
            <surname>Systems</surname>
            , Atlanta,
            <given-names>GA</given-names>
          </string-name>
          ,
          <year>2009</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>A. F. N.</given-names>
            <surname>Al-Shammari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Weldemariam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Villafiorita</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Tessaris</surname>
          </string-name>
          ,
          <article-title>"Vote verification through open standard: A roadmap,"</article-title>
          2011 International Workshop on Requirements Engineering for Electronic Voting Systems, Trento,
          <year>2011</year>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Langer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Buchmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>"Specification of a Voting Service Provider,"</article-title>
          2009 First International Workshop on Requirements Engineering for e-Voting
          <string-name>
            <surname>Systems</surname>
            , Atlanta,
            <given-names>GA</given-names>
          </string-name>
          ,
          <year>2009</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>G.</given-names>
            <surname>Schryen</surname>
          </string-name>
          and E. Rich,
          <article-title>"Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,"</article-title>
          <source>in IEEE Transactions on Information Forensics and Security</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>729</fpage>
          -
          <lpage>744</lpage>
          , Dec.
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Pasupuleti</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. S. C.</given-names>
            <surname>Babu</surname>
          </string-name>
          ,
          <article-title>"Analysis of internet voting in India,"</article-title>
          <source>2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)</source>
          ,
          <year>Coimbatore</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>N.</given-names>
            <surname>Mpekoa</surname>
          </string-name>
          and
          <string-name>
            <surname>D. van Greunen</surname>
          </string-name>
          ,
          <article-title>"E-voting experiences: A case of Namibia and Estonia," 2017</article-title>
          <string-name>
            <surname>IST-Africa Week Conference (IST-Africa</surname>
            <given-names>)</given-names>
          </string-name>
          , Windhoek,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>J. Epstein</surname>
          </string-name>
          ,
          <article-title>"Electronic Voting,"</article-title>
          <source>in Computer</source>
          , vol.
          <volume>40</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>95</lpage>
          , Aug.
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. C.
          <string-name>
            <surname>Garcia-Zamora</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Rodriguez-Henriquez</surname>
            and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ortiz-Arroyo</surname>
          </string-name>
          ,
          <article-title>"SELES: an e-voting system for medium scale online election,"</article-title>
          <source>Sixth Mexican International Conference on Computer Science (ENC'05)</source>
          , Puebla, Mexico,
          <year>2005</year>
          , pp.
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>B.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <article-title>"Cryptanalysis on an E-voting Scheme over Computer Network,"</article-title>
          <source>2008 International Conference on Computer Science and Software Engineering</source>
          , Hubei,
          <year>2008</year>
          , pp.
          <fpage>826</fpage>
          -
          <lpage>829</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>A. D. Rubin</surname>
            and
            <given-names>D. R.</given-names>
          </string-name>
          <string-name>
            <surname>Jefferson</surname>
          </string-name>
          ,
          <article-title>"New Research Results for Electronic Voting,"</article-title>
          <source>in IEEE Security &amp; Privacy</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>12</fpage>
          -
          <lpage>13</lpage>
          , May-June
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>S. F.</given-names>
            <surname>Mjølsnes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mauw</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Katsikas</surname>
          </string-name>
          , Eds., “Public Key Infrastructure,” Lecture Notes in Computer Science,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. A. Maeda, “
          <article-title>PKI Solutions for Trusted E-Commerce: Survey of the De Facto Standard Competition in PKI Industries,” Information Technology Policy and the Digital Divide</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>D.</given-names>
            <surname>Chadwick</surname>
          </string-name>
          and
          <string-name>
            <surname>G</surname>
          </string-name>
          . Zhao, Eds., “Public Key Infrastructure,” Lecture Notes in Computer Science,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .V.
          <string-name>
            <surname>Stasev</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          <string-name>
            <surname>Kuznetsov</surname>
          </string-name>
          . “
          <article-title>Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes”</article-title>
          .
          <source>Kibernetika i Sistemnyi Analiz, No. 3</source>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>57</lpage>
          , May-June
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>J. Lopez</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Samarati</surname>
            , and
            <given-names>J. L.</given-names>
          </string-name>
          <string-name>
            <surname>Ferrer</surname>
          </string-name>
          , Eds., “Public Key Infrastructure,” Lecture Notes in Computer Science,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. J. Davies, “
          <article-title>Implementing SSL/TLS Using Cryptography and</article-title>
          PKI,” Dec.
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Atzeni</surname>
          </string-name>
          and
          <string-name>
            <surname>A</surname>
          </string-name>
          . Lioy, Eds., “Public Key Infrastructure,” Lecture Notes in Computer Science,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. I. Gorbenko,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yesina</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponomar</surname>
          </string-name>
          ,
          <article-title>"Anonymous electronic signature method," 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science</article-title>
          and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          ,
          <year>Kharkiv</year>
          ,
          <year>2016</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Krasnobayev</surname>
            <given-names>V. A.</given-names>
          </string-name>
          <article-title>Method for realization of transformations in public-key cryptography</article-title>
          . Telecommunications and
          <string-name>
            <given-names>Radio</given-names>
            <surname>Engineering</surname>
          </string-name>
          . - Volume
          <volume>66</volume>
          ,
          <year>2007</year>
          Issue 17, pp.
          <fpage>1559</fpage>
          -
          <lpage>1572</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , I. Svatovskij,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiyan</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Pushkar</surname>
          </string-name>
          <article-title>'ov, "Code-based public-key cryptosystems for the post-quantum period,"</article-title>
          2017 4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          ,
          <year>Kharkov</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>130</lpage>
          . DOI:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2017</year>
          .8246365
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25. W. T. Polk and
          <string-name>
            <given-names>K.</given-names>
            <surname>Seamons</surname>
          </string-name>
          , “6th annual
          <string-name>
            <surname>PKI R&amp;D workshop 'Applications-Driven</surname>
            <given-names>PKI</given-names>
          </string-name>
          ' proceedings,”
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lutsenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Makushenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <article-title>"Code-based key encapsulation mechanisms for post-quantum standardization,"</article-title>
          <source>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>276</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , “Applied Cryptography, Second Edition,” Oct.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , Yu. І.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>D. I.</given-names>
          </string-name>
          <article-title>Prokopovych-Tkachenko, М</article-title>
          . S. Lutsenko,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Pastukhov</surname>
          </string-name>
          . “
          <source>NIST PQC: Code-Based Cryptosystems.” Telecommunications and Radio Engineering</source>
          , Volume
          <volume>78</volume>
          ,
          <year>2019</year>
          , Issue 5, pp.
          <fpage>429</fpage>
          -
          <lpage>441</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferguson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , and T. Kohno, “Cryptography Engineering,” Oct.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lutsenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Chepurko</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kavun</surname>
          </string-name>
          ,
          <article-title>"Code-based cryptosystems from NIST PQC,"</article-title>
          <source>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. G. Guo,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Vassileva</surname>
          </string-name>
          , “
          <article-title>Improving PGP Web of Trust through the Expansion of Trusted Neighborhood</article-title>
          ,”
          <source>2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, Aug</source>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Pushkar'ov</article-title>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kiyan</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <article-title>"Code-based electronic digital signature,"</article-title>
          <source>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>336</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33. D. Wueppelmann, “PGP Auth:
          <article-title>Using Public Key Encryption for Authentication on the Web</article-title>
          .”
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .V.
          <string-name>
            <surname>Stasev</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          <string-name>
            <surname>Kuznetsov</surname>
          </string-name>
          , “
          <article-title>Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes.” Cybernetics and Systems Analysis</article-title>
          , vol.
          <volume>41</volume>
          , Issue 3, pp.
          <fpage>354</fpage>
          -
          <lpage>363</lpage>
          , May
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <given-names>K.</given-names>
            <surname>Portz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Strong</surname>
          </string-name>
          , and L. Sundby, “To Trust Or Not To Trust:
          <article-title>The Impact Of WebTrust On The Perceivёed Trustworthiness Of A Web Site,”</article-title>
          <source>Review of Business Information Systems (RBIS)</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>3</issue>
          , p.
          <fpage>35</fpage>
          ,
          <string-name>
            <surname>Jul</surname>
          </string-name>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jin</surname>
          </string-name>
          , “
          <source>Trust Analysis of Web Services Based on a Trust Ontology,” Lecture Notes in Computer Science</source>
          , pp.
          <fpage>642</fpage>
          -
          <lpage>648</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <given-names>K.</given-names>
            <surname>Isirova</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Potii</surname>
          </string-name>
          ,
          <article-title>"Decentralized public key infrastructure development principles,"</article-title>
          <source>2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kiev,
          <year>2018</year>
          , pp.
          <fpage>305</fpage>
          -
          <lpage>310</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Gregory</surname>
            <given-names>Maxwell</given-names>
          </string-name>
          , Andrew Poelstra,
          <fpage>2015</fpage>
          -
          <volume>06</volume>
          -
          <fpage>02</fpage>
          . Borromean ring signatures. [online] Available at: https://pdfs.semanticscholar.org/4160/470c7f6cf05ffc81a98e8fd67fb0c84836ea.pdf
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39. Nicolas van Saberhagen,
          <year>2013</year>
          .
          <article-title>CryptoNote v 2.0</article-title>
          . [online] Available at: https://cryptonote.org/whitepaper.pdf
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Gamage</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gras</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crispo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Tanenbaum</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <year>2006</year>
          ,
          <string-name>
            <surname>August.</surname>
          </string-name>
          <article-title>An identity-based ring signature scheme with enhanced privacy</article-title>
          .
          <source>In 2006 Securecomm and Workshops</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Zissis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lekkas</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <year>2011</year>
          .
          <article-title>Securing e-Government and e-Voting with an open cloud computing architecture</article-title>
          .
          <source>Government Information Quarterly</source>
          ,
          <volume>28</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>239</fpage>
          -
          <lpage>251</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Vaccaro</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spring</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chefles</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <year>2007</year>
          .
          <article-title>Quantum protocols for anonymous voting and surveying</article-title>
          .
          <source>Physical Review A</source>
          ,
          <volume>75</volume>
          (
          <issue>1</issue>
          ), p.
          <fpage>012333</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Maus</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peters</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Storcken</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <year>2007</year>
          .
          <article-title>Anonymous voting and minimal manipulability</article-title>
          .
          <source>Journal of Economic Theory</source>
          ,
          <volume>135</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>533</fpage>
          -
          <lpage>544</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44. L.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            and
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>The Application of Fuzzing in Web Software Security Vulnerabilities Test," 2013 International Conference on Information Technology and Applications</source>
          , Chengdu,
          <year>2013</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , Smirnov,
          <string-name>
            <surname>A.A.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Danilenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Berezovsky. “</surname>
          </string-name>
          <article-title>The statistical analysis of a network traffic for the intrusion detection and prevention systems</article-title>
          .
          <source>” Telecommunications and Radio Engineering</source>
          , Volume
          <volume>74</volume>
          ,
          <issue>2015 Issue 1</issue>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <given-names>S.</given-names>
            <surname>Sedaghat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Adibniya</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarram</surname>
          </string-name>
          ,
          <article-title>"The investigation of vulnerability test in application software,"</article-title>
          <source>2009 International Conference on the Current Trends in Information Technology (CTIT)</source>
          ,
          <year>Dubai</year>
          ,
          <year>2009</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Alexandr</surname>
            <given-names>Kuznetsov</given-names>
          </string-name>
          , Oleksiy Shapoval, Kyrylo Chernov, Yehor Yeromin, Mariia Popova, Olga Syniavska.
          <article-title>Automated software vulnerability testing using in-depth training methods</article-title>
          .
          <source>In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019)</source>
          , Zaporizhzhia, Ukraine,
          <source>April 15-19</source>
          ,
          <year>2019</year>
          ., pp.
          <fpage>227</fpage>
          -
          <lpage>240</lpage>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <given-names>M.</given-names>
            <surname>Kumar</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Mathur</surname>
          </string-name>
          ,
          <article-title>"Unsupervised outlier detection technique for intrusion detection in cloud computing,"</article-title>
          <source>International Conference for Convergence for Technology-2014</source>
          , Pune,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <given-names>O.</given-names>
            <surname>Cetinkaya</surname>
          </string-name>
          ,
          <article-title>"Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract),"</article-title>
          2008 Third International Conference on Availability, Reliability and Security, Barcelona,
          <year>2008</year>
          , pp.
          <fpage>1451</fpage>
          -
          <lpage>1456</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50. H.
          <string-name>
            <surname>Orman</surname>
          </string-name>
          ,
          <article-title>"Blockchain: the Emperors New PKI?,"</article-title>
          <source>in IEEE Internet Computing</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>28</lpage>
          , Mar./Apr.
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51. W. Zhang et al.,
          <article-title>"A Privacy-Preserving Voting Protocol on Blockchain,"</article-title>
          <source>2018 IEEE 11th International Conference on Cloud Computing (CLOUD)</source>
          , San Francisco, CA,
          <year>2018</year>
          , pp.
          <fpage>401</fpage>
          -
          <lpage>408</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <given-names>B.</given-names>
            <surname>Shahzad</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Crowcroft</surname>
          </string-name>
          ,
          <article-title>"Trustworthy Electronic Voting Using Adjusted Blockchain Technology,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>24477</fpage>
          -
          <lpage>24488</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53. S. Nakamoto, “
          <article-title>Bitcoin:A peer-to-peer electronic cash system</article-title>
          .
          <source>”</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>