Secure Online Voting System Using Hybrid Post-Quantum Signatures

被引:0
作者
Shriya, S. [1 ]
Sweetlin, J. Dhalia [1 ]
Supraja, V [1 ]
机构
[1] Anna Univ, Dept Informat Technol, MIT Campus, Chennai, Tamil Nadu, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Merkle trees; quantum vulnerabilities; SHA-256; Lamport signatures; post-quantum cryptography;
D O I
10.1109/ACCAI61061.2024.10602388
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work introduces a secure online voting system designed to withstand potential quantum threats. It combines Merkle Trees, Lamport Signatures, and the SHA-256 hash function to secure the system's cryptographic infrastructure. Merkle Trees are employed for efficient data integrity verification, ensuring the reliability of transmitted information. Lamport Signatures, known for their resistance to quantum attacks, contribute to authentication mechanisms, adding an extra layer of security to the voting process. The utilization of the SHA-256 hash function further enhances the system against potential quantum vulnerabilities. The integration of Lamport Signatures with the Merkle Trees facilitates a secure verification process. This enables rapid checks for vote integrity, providing a defense against tampering or malicious interference. The goal of this work is to establish a secure online voting platform that upholds the principles of confidentiality, integrity, and authenticity. By adhering to the highest security standards in the field, the proposed system ensures a trustworthy environment for the electoral process, even in the face of emerging quantum threats.
引用
收藏
页数:7
相关论文
共 15 条
  • [1] Abdullah G.M., 2018, 2018 INT C COMPUTING, P1
  • [2] Lamport n-Time Signature Scheme
    Alboaie, Sinica
    Cosovan, Doina
    Chiorean, Ligia-D.
    Vaida, Mircea Florin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2018,
  • [3] Ananda Mohan P.V., 2023, P 2023 IEEE INT C PU, P1, DOI [10.1109/PKIA58446.2023.10262777, DOI 10.1109/PKIA58446.2023.10262777]
  • [4] Anjima VS, 2019, PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), P858, DOI [10.1109/ICCS45141.2019.9065871, 10.1109/iccs45141.2019.9065871]
  • [5] Dhanush Cheruku Sai, 2023, 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), P1219, DOI 10.1109/ICAISS58487.2023.10250627
  • [6] fandom, Merkle signature scheme
  • [7] Hirose S, 2013, PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), P313
  • [8] Jambhulkar S. M., 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC), P371, DOI 10.1109/ICESC.2014.70
  • [9] Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems
    Kang, Dongwoo
    Ryu, Hoil
    Won, Dongho
    [J]. PROCEEDINGS OF THE 2022 16TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2022), 2022,
  • [10] Mavroeidis V, 2018, Arxiv, DOI [arXiv:1804.00200, DOI 10.14569/IJACSA.2018.090354]