Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Electronic Voting System in a Cloud Computing Environment


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i11.7667

Abstract


In this paper we present an electronic voting system based on Homomorphic encryption to ensure privacy, confidentiality and integrity in the voting. Our proposal offers all the advantages of the additively homomorphic encryption cryptosystems. The proposed voting scheme is suitable for multi-candidate elections as well as for elections in which contains neutral votes.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Homomorphic Encryption; Cloud Computing; Electronic Voting; Data Security

Full Text:

PDF


References


Ram Mohan, N.R., Baburaj, E., Genetic clustering with workload multi-task scheduler in cloud environment, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (3), pp. 77-86.

MATEU, Víctor, MIRET, Josep M., et SEBÉ, Francesc. A hybrid approach to vector-based homomorphic tallying remote voting. International Journal of Information Security, 2015, p. 1-11.
http://dx.doi.org/10.1007/s10207-015-0279-8

HU, Yin. Improving the Efficiency of Homomorphic Encryption Schemes. 2013. Thèse de doctorat. Virginia Tech.

ZHAO, Yingming, PAN, Yue, WANG, Sanchao, et al. An anonymous voting system based on homomorphic encryption. In : Communications (COMM), 2014 10th International Conference on. IEEE, 2014. p. 1-4.
http://dx.doi.org/10.1109/iccomm.2014.6866682

AHMAD, Tohari, HU, Jiankun, et HAN, Song. An efficient mobile voting system security scheme based on elliptic curve cryptography. In : Network and System Security, 2009. NSS'09. Third International Conference on. IEEE, 2009. p. 474-479.
http://dx.doi.org/10.1109/nss.2009.57

SEBÉ, Francesc, MIRET, Josep M., PUJOLÀS, Jordi, et al. Simple and efficient hash-based verifiable mixing for remote electronic voting. Computer communications, 2010, vol. 33, no 6, p. 667-675
http://dx.doi.org/10.1016/j.comcom.2009.11.013

Rebecca Meissen, A Mathematical Approach to Fully Homomorphic Encryption, A Major Qualifying Project Report Submitted to The Faculty of the Worcester Polytechnic Institute.

Taher ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 469-472, 1985.
http://dx.doi.org/10.1109/tit.1985.1057074

PAILLIER, Pascal. Public-key cryptosystems based on composite degree residuosity classes. In : Advances in cryptology EUROCRYPT’99. Springer Berlin Heidelberg, 1999. p. 223-238.
http://dx.doi.org/10.1007/3-540-48910-x_16

Chalabi, M., Mukhtar, M., Yahya, Y., E-Voting Systems to Facilitate Elections in Iraq, (2014) International Journal on Information Technology (IREIT), 2 (4), pp. 108-113.

Ibtissem Zaafrani and Michael Bulois, Cryptographie, June 30, 2014

D. Shanks, "Class number. A theory of factorization and genera," in: Proc. Symp. Pure Math., Vol. 20, AMS (1970), pp. 415-440.
http://dx.doi.org/10.1090/pspum/020/0316385

Jovanovic, V., Njegus, A., The Use of GIS in Tourism Supply and WEB Portal Development, (2013) International Journal on Information Technology (IREIT), 1 (5), pp. 292-299.


Refbacks




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize