Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Electronic Voting System in a Cloud Computing Environment

(*) Corresponding author

Authors' affiliations



In this paper we present an electronic voting system based on Homomorphic encryption to ensure privacy, confidentiality and integrity in the voting. Our proposal offers all the advantages of the additively homomorphic encryption cryptosystems. The proposed voting scheme is suitable for multi-candidate elections as well as for elections in which contains neutral votes.
Copyright © 2015 Praise Worthy Prize - All rights reserved.


Homomorphic Encryption; Cloud Computing; Electronic Voting; Data Security

Full Text:



Ram Mohan, N.R., Baburaj, E., Genetic clustering with workload multi-task scheduler in cloud environment, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (3), pp. 77-86.

MATEU, Víctor, MIRET, Josep M., et SEBÉ, Francesc. A hybrid approach to vector-based homomorphic tallying remote voting. International Journal of Information Security, 2015, p. 1-11.

HU, Yin. Improving the Efficiency of Homomorphic Encryption Schemes. 2013. Thèse de doctorat. Virginia Tech.

ZHAO, Yingming, PAN, Yue, WANG, Sanchao, et al. An anonymous voting system based on homomorphic encryption. In : Communications (COMM), 2014 10th International Conference on. IEEE, 2014. p. 1-4.

AHMAD, Tohari, HU, Jiankun, et HAN, Song. An efficient mobile voting system security scheme based on elliptic curve cryptography. In : Network and System Security, 2009. NSS'09. Third International Conference on. IEEE, 2009. p. 474-479.

SEBÉ, Francesc, MIRET, Josep M., PUJOLÀS, Jordi, et al. Simple and efficient hash-based verifiable mixing for remote electronic voting. Computer communications, 2010, vol. 33, no 6, p. 667-675

Rebecca Meissen, A Mathematical Approach to Fully Homomorphic Encryption, A Major Qualifying Project Report Submitted to The Faculty of the Worcester Polytechnic Institute.

Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.

PAILLIER, Pascal. Public-key cryptosystems based on composite degree residuosity classes. In : Advances in cryptology EUROCRYPT’99. Springer Berlin Heidelberg, 1999. p. 223-238.

Chalabi, M., Mukhtar, M., Yahya, Y., E-Voting Systems to Facilitate Elections in Iraq, (2014) International Journal on Information Technology (IREIT), 2 (4), pp. 108-113.

Ibtissem Zaafrani and Michael Bulois, Cryptographie, June 30, 2014

D. Shanks, "Class number. A theory of factorization and genera," in: Proc. Symp. Pure Math., Vol. 20, AMS (1970), pp. 415-440.

Jovanovic, V., Njegus, A., The Use of GIS in Tourism Supply and WEB Portal Development, (2013) International Journal on Information Technology (IREIT), 1 (5), pp. 292-299.


Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize