

An Efficient Electronic Voting System in a Cloud Computing Environment
(*) Corresponding author
DOI: https://doi.org/10.15866/irecos.v10i11.7667
Abstract
In this paper we present an electronic voting system based on Homomorphic encryption to ensure privacy, confidentiality and integrity in the voting. Our proposal offers all the advantages of the additively homomorphic encryption cryptosystems. The proposed voting scheme is suitable for multi-candidate elections as well as for elections in which contains neutral votes.
Copyright © 2015 Praise Worthy Prize - All rights reserved.
Keywords
References
Ram Mohan, N.R., Baburaj, E., Genetic clustering with workload multi-task scheduler in cloud environment, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (3), pp. 77-86.
MATEU, Víctor, MIRET, Josep M., et SEBÉ, Francesc. A hybrid approach to vector-based homomorphic tallying remote voting. International Journal of Information Security, 2015, p. 1-11.
http://dx.doi.org/10.1007/s10207-015-0279-8
HU, Yin. Improving the Efficiency of Homomorphic Encryption Schemes. 2013. Thèse de doctorat. Virginia Tech.
ZHAO, Yingming, PAN, Yue, WANG, Sanchao, et al. An anonymous voting system based on homomorphic encryption. In : Communications (COMM), 2014 10th International Conference on. IEEE, 2014. p. 1-4.
http://dx.doi.org/10.1109/iccomm.2014.6866682
AHMAD, Tohari, HU, Jiankun, et HAN, Song. An efficient mobile voting system security scheme based on elliptic curve cryptography. In : Network and System Security, 2009. NSS'09. Third International Conference on. IEEE, 2009. p. 474-479.
http://dx.doi.org/10.1109/nss.2009.57
SEBÉ, Francesc, MIRET, Josep M., PUJOLÀS, Jordi, et al. Simple and efficient hash-based verifiable mixing for remote electronic voting. Computer communications, 2010, vol. 33, no 6, p. 667-675
http://dx.doi.org/10.1016/j.comcom.2009.11.013
Rebecca Meissen, A Mathematical Approach to Fully Homomorphic Encryption, A Major Qualifying Project Report Submitted to The Faculty of the Worcester Polytechnic Institute.
Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.
http://dx.doi.org/10.1109/tit.1985.1057074
PAILLIER, Pascal. Public-key cryptosystems based on composite degree residuosity classes. In : Advances in cryptology EUROCRYPT’99. Springer Berlin Heidelberg, 1999. p. 223-238.
http://dx.doi.org/10.1007/3-540-48910-x_16
Chalabi, M., Mukhtar, M., Yahya, Y., E-Voting Systems to Facilitate Elections in Iraq, (2014) International Journal on Information Technology (IREIT), 2 (4), pp. 108-113.
Ibtissem Zaafrani and Michael Bulois, Cryptographie, June 30, 2014
D. Shanks, "Class number. A theory of factorization and genera," in: Proc. Symp. Pure Math., Vol. 20, AMS (1970), pp. 415-440.
http://dx.doi.org/10.1090/pspum/020/0316385
Jovanovic, V., Njegus, A., The Use of GIS in Tourism Supply and WEB Portal Development, (2013) International Journal on Information Technology (IREIT), 1 (5), pp. 292-299.
Refbacks
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2023 Praise Worthy Prize